Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Securden Windows Privilege Manager eliminates local administrators from endpoints and helps standard users seamlessly elevate and use applications they actually require to accomplish tasks. Block unauthorized access to applications and eliminate attack vectors altogether.
Securden Windows Privilege Manager eliminates local administrators from endpoints and helps standard users seamlessly elevate and use applications...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$9.99/month

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.5 /5
(46)

Ease of Use

4.6/ 5

Features

4.5/ 5

Customer Service

4.5/ 5

Value for Money

4.5/ 5

No reviews available

Already have EndPoint Privilege Manager?

Write a Review!

Total features 29

  • AI/Machine Learning
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Access Control
  • Application Security
  • Approval Process Control
  • Audit Trail
  • Authentication
  • Behavioral Analytics
  • Cloud Application Security
  • Configurable Workflow
  • Continuous Monitoring
  • Customizable Reports
  • Data Security
  • Data Visualization
  • Device Auto Discovery
  • Device Management
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Financial Data Protection
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Least Privilege
  • Maintenance Scheduling
  • Multiple User Accounts
  • Policy Management
  • Prioritization
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remediation Management
  • Reporting/Analytics
  • Role-Based Permissions
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Summary Reports
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • User Activity Monitoring
  • User Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 39

  • AI/Machine Learning
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Access Control
  • Application Security
  • Approval Process Control
  • Audit Trail
  • Authentication
  • Behavioral Analytics
  • Cloud Application Security
  • Configurable Workflow
  • Continuous Monitoring
  • Customizable Reports
  • Data Security
  • Data Visualization
  • Device Auto Discovery
  • Device Management
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Financial Data Protection
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Least Privilege
  • Maintenance Scheduling
  • Multiple User Accounts
  • Policy Management
  • Prioritization
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remediation Management
  • Reporting/Analytics
  • Role-Based Permissions
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Summary Reports
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • User Activity Monitoring
  • User Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting
  • Workflow Management