Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Heimdal Privileged Access Management is a PAM solution that allows sysadmins to view and check escalation requests, as well as approve or decline them on the go. Available in both the dashboard tab and on mobile, it is the ideal tool for full granular visibility into the company network.
Heimdal Privileged Access Management is a PAM solution that allows sysadmins to view and check escalation requests, as well as approve or decline...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$0.01/year

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.5 /5
(218)

Ease of Use

4.3/ 5

Features

4.4/ 5

Customer Service

4.1/ 5

Value for Money

4.2/ 5

Overall rating

4.6 /5
(20)

Ease of Use

4.6/ 5

Features

4.5/ 5

Customer Service

4.7/ 5

Value for Money

4.6/ 5

Total features 24

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Ad hoc Reporting
  • Administrative Reporting
  • Alerts/Escalation
  • Alerts/Notifications
  • Anti Virus
  • Application Access Control
  • Application Management
  • Application Security
  • Approval Process Control
  • Audit Management
  • Audit Trail
  • Authentication
  • Automated Scheduling
  • Behavioral Analytics
  • Compliance Management
  • Credential Management
  • Data Collection
  • Data Security
  • Device Auto Discovery
  • Device Management
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • HIPAA Compliant
  • Member Accounts
  • Monitoring
  • Multi-Factor Authentication
  • Multiple User Accounts
  • Password Management
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remote Access Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Analysis
  • Role-Based Permissions
  • Secure Login
  • Security Auditing
  • Self Service Portal
  • Server Monitoring
  • Single Sign On
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • User Activity Monitoring
  • User Defined Attributes
  • User Management
  • Vulnerability Scanning
  • Web Threat Management

Total features 44

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Ad hoc Reporting
  • Administrative Reporting
  • Alerts/Escalation
  • Alerts/Notifications
  • Anti Virus
  • Application Access Control
  • Application Management
  • Application Security
  • Approval Process Control
  • Audit Management
  • Audit Trail
  • Authentication
  • Automated Scheduling
  • Behavioral Analytics
  • Compliance Management
  • Credential Management
  • Data Collection
  • Data Security
  • Device Auto Discovery
  • Device Management
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • HIPAA Compliant
  • Member Accounts
  • Monitoring
  • Multi-Factor Authentication
  • Multiple User Accounts
  • Password Management
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remote Access Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Analysis
  • Role-Based Permissions
  • Secure Login
  • Security Auditing
  • Self Service Portal
  • Server Monitoring
  • Single Sign On
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • User Activity Monitoring
  • User Defined Attributes
  • User Management
  • Vulnerability Scanning
  • Web Threat Management