Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
                    Automox is a cloud-native solution that is accessible worldwide, providing effective management for OS and third-party patches, security settings, and custom scripts across Windows, Mac, and Linux systems through a user-friendly console. This platform allows IT and SecOps teams to swiftly gain oversight and control over on-premises, remote, and virtual endpoints, eliminating the need for expensive infrastructure deployment. By streamlining these processes, Automox enhances operational efficiency and strengthens security measures across diverse environments.
                
            
        
            Description
                    Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    Axonius
            
            
        
        
    
        
        
            
                
    JupiterOne
            
            
        
        
    
        
        
            
                
    Slack
            
            
        
        
    
        
        
            
                
    ThreatAware
            
            
        
        
    
        
        
            
                
    Adaptive Security
            
            
        
        
    
        
        
            
                
    AlexisHR
            
            
        
        
    
        
        
            
                
    AuthPoint
            
            
        
        
    
        
        
            
                
    Blink
            
            
        
        
    
        
        
            
                
    Blueboard
            
            
        
        
    
        
        
            
                
    Carbide
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Integrations
            
                
    Axonius
            
            
        
        
    
        
        
            
                
    JupiterOne
            
            
        
        
    
        
        
            
                
    Slack
            
            
        
        
    
        
        
            
                
    ThreatAware
            
            
        
        
    
        
        
            
                
    Adaptive Security
            
            
        
        
    
        
        
            
                
    AlexisHR
            
            
        
        
    
        
        
            
                
    AuthPoint
            
            
        
        
    
        
        
            
                
    Blink
            
            
        
        
    
        
        
            
                
    Blueboard
            
            
        
        
    
        
        
            
                
    Carbide
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Pricing Details
        $3.00
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        $9/user
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Automox
Founded
2015
Country
United States
Website
www.automox.com
Vendor Details
Company Name
JumpCloud
Founded
2012
Country
United States
Website
jumpcloud.com
Product Features
Computer Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Audit Trail
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Database Security Audit
                                        
                                    
                                    
                                    
                                        File Access Control
                                        
                                    
                                    
                                    
                                        Financial Data Protection
                                        
                                    
                                    
                                    
                                        Maintenance Scheduling
                                        
                                    
                                    
                                    
                                        Real Time Monitoring
                                        
                                    
                                    
                                    
                                        Security Event Log
                                        
                                    
                                    
                                    
                                        Virus Definition Update
                                        
                                    
                                    
                                    
                                        Vulnerability Protection
                                        
                                    
                            
                        Endpoint Detection and Response (EDR)
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Blacklisting/Whitelisting
                                        
                                    
                                    
                                    
                                        Continuous Monitoring
                                        
                                    
                                    
                                    
                                        Malware/Anomaly Detection
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Remediation Management
                                        
                                    
                                    
                                    
                                        Root Cause Analysis
                                        
                                    
                            
                        Endpoint Protection
                                        Activity Log
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Device Management
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Signature Matching
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        IT Asset Management
                                        Asset Tracking
                                        
                                    
                                    
                                    
                                        Audit Management
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Configuration Management
                                        
                                    
                                    
                                    
                                        Contract/License Management
                                        
                                    
                                    
                                    
                                        Cost Tracking
                                        
                                    
                                    
                                    
                                        Depreciation Management
                                        
                                    
                                    
                                    
                                        IT Service Management
                                        
                                    
                                    
                                    
                                        Inventory Management
                                        
                                    
                                    
                                    
                                        Maintenance Management
                                        
                                    
                                    
                                    
                                        Procurement Management
                                        
                                    
                                    
                                    
                                        Requisition Management
                                        
                                    
                                    
                                    
                                        Supplier Management
                                        
                                    
                            
                        IT Management
                                        Capacity Monitoring
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Event Logs
                                        
                                    
                                    
                                    
                                        Hardware Inventory
                                        
                                    
                                    
                                    
                                        IT Budgeting
                                        
                                    
                                    
                                    
                                        License Management
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Remote Access
                                        
                                    
                                    
                                    
                                        Scheduling
                                        
                                    
                                    
                                    
                                        Software Inventory
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                            
                        IT Service
                                        Contract Management
                                        
                                    
                                    
                                    
                                        IT Asset Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Knowledge Management
                                        
                                    
                                    
                                    
                                        Release Management
                                        
                                    
                                    
                                    
                                        Self Service Portal
                                        
                                    
                                    
                                    
                                        Service Catalog
                                        
                                    
                                    
                                    
                                        Service Reporting
                                        
                                    
                                    
                                    
                                        Ticket Management
                                        
                                    
                            
                        MSP
                                        Backup Management
                                        
                                    
                                    
                                    
                                        Billing & Invoicing
                                        
                                    
                                    
                                    
                                        CRM
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        Help Desk
                                        
                                    
                                    
                                    
                                        Issue Management
                                        
                                    
                                    
                                    
                                        Live Chat
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Privileged Access Management (PAM)
                                        
                                    
                                    
                                    
                                        Project Management
                                        
                                    
                                    
                                    
                                        Remote Access
                                        
                                    
                                    
                                    
                                        Remote Systems Monitoring
                                        
                                    
                                    
                                    
                                        Scheduling
                                        
                                    
                            
                        Patch Management
                                        Alerts/Notifications
                                        
                                    
                                    
                                    
                                        Automatic Approval
                                        
                                    
                                    
                                    
                                        Automatic Patch Deployment
                                        
                                    
                                    
                                    
                                        Automatic Scans
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Custom Patches
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        Network Wide Management
                                        
                                    
                                    
                                    
                                        Patch Prioritization
                                        
                                    
                                    
                                    
                                        Patch Testing
                                        
                                    
                                    
                                    
                                        Remote Access/Control
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        Vulnerability Management
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Asset Tagging
                                        
                                    
                                    
                                    
                                        Network Scanning
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vulnerability Assessment
                                        
                                    
                                    
                                    
                                        Web Scanning
                                        
                                    
                            
                        Product Features
Authentication
                                        Biometric
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Knowledge-Based Authentication
                                        
                                    
                                    
                                    
                                        Mobile Authentication
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Out-of-Band Authentication
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Self Service Portal
                                        
                                    
                                    
                                    
                                        Single Sign On
                                        
                                    
                                    
                                    
                                        Social Sign On
                                        
                                    
                            
                        Cloud Management
                                        Access Control
                                        
                                    
                                    
                                    
                                        Billing & Provisioning
                                        
                                    
                                    
                                    
                                        Capacity Analytics
                                        
                                    
                                    
                                    
                                        Cost Management
                                        
                                    
                                    
                                    
                                        Demand Monitoring
                                        
                                    
                                    
                                    
                                        Multi-Cloud Management
                                        
                                    
                                    
                                    
                                        Performance Analytics
                                        
                                    
                                    
                                    
                                        SLA Management
                                        
                                    
                                    
                                    
                                        Supply Monitoring
                                        
                                    
                                    
                                    
                                        Workflow Approval
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        Endpoint Protection
                                        Activity Log
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Device Management
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Signature Matching
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        Identity Management
                                        Access Certification
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Privileged Account Management
                                        
                                    
                                    
                                    
                                        Self-Service Access Request
                                        
                                    
                                    
                                    
                                        Single Sign On
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                                    
                                    
                                        User Provisioning
                                        
                                    
                            
                        IT Management
                                        Capacity Monitoring
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Event Logs
                                        
                                    
                                    
                                    
                                        Hardware Inventory
                                        
                                    
                                    
                                    
                                        IT Budgeting
                                        
                                    
                                    
                                    
                                        License Management
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Remote Access
                                        
                                    
                                    
                                    
                                        Scheduling
                                        
                                    
                                    
                                    
                                        Software Inventory
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                            
                        IT Service
                                        Contract Management
                                        
                                    
                                    
                                    
                                        IT Asset Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Knowledge Management
                                        
                                    
                                    
                                    
                                        Release Management
                                        
                                    
                                    
                                    
                                        Self Service Portal
                                        
                                    
                                    
                                    
                                        Service Catalog
                                        
                                    
                                    
                                    
                                        Service Reporting
                                        
                                    
                                    
                                    
                                        Ticket Management
                                        
                                    
                            
                        MSP
                                        Backup Management
                                        
                                    
                                    
                                    
                                        Billing & Invoicing
                                        
                                    
                                    
                                    
                                        CRM
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        Help Desk
                                        
                                    
                                    
                                    
                                        Issue Management
                                        
                                    
                                    
                                    
                                        Live Chat
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Privileged Access Management (PAM)
                                        
                                    
                                    
                                    
                                        Project Management
                                        
                                    
                                    
                                    
                                        Remote Access
                                        
                                    
                                    
                                    
                                        Remote Systems Monitoring
                                        
                                    
                                    
                                    
                                        Scheduling
                                        
                                    
                            
                        Network Security
                                        Access Control
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Firewalls
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Response
                                        
                                    
                                    
                                    
                                        VPN
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        Password Management
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Password Generator
                                        
                                    
                                    
                                    
                                        Password Reset
                                        
                                    
                                    
                                    
                                        Password Synchronization
                                        
                                    
                                    
                                    
                                        Single Sign On
                                        
                                    
                                    
                                    
                                        User Management
                                        
                                    
                            
                        Policy Management
                                        Approval Process Control
                                        
                                    
                                    
                                    
                                        Attestation
                                        
                                    
                                    
                                    
                                        Audit Trails
                                        
                                    
                                    
                                    
                                        Policy Creation
                                        
                                    
                                    
                                    
                                        Policy Library
                                        
                                    
                                    
                                    
                                        Policy Metadata Management
                                        
                                    
                                    
                                    
                                        Policy Training
                                        
                                    
                                    
                                    
                                        Reporting / Analytics
                                        
                                    
                                    
                                    
                                        Version Control
                                        
                                    
                                    
                                    
                                        Workflow Management
                                        
                                    
                            
                        Privileged Access Management
                                        Application Access Control
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        For MSPs
                                        
                                    
                                    
                                    
                                        Granular Access Controls
                                        
                                    
                                    
                                    
                                        Least Privilege
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Remote Access Management
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                            
                        RMM
                                        Deployment Management
                                        
                                    
                                    
                                    
                                        For MSPs
                                        
                                    
                                    
                                    
                                        IT Asset Management
                                        
                                    
                                    
                                    
                                        Mobile Access
                                        
                                    
                                    
                                    
                                        Network Monitoring
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Real-time Alerts
                                        
                                    
                                    
                                    
                                        Remediation Management
                                        
                                    
                            
                        Server Management
                                        CPU Monitoring
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Database Servers
                                        
                                    
                                    
                                    
                                        Email Monitoring
                                        
                                    
                                    
                                    
                                        Event Logs
                                        
                                    
                                    
                                    
                                        History Tracking
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Scheduling
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                                    
                                    
                                        Virtual Machine Monitoring
                                        
                                    
                            
                        SIEM
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        File Integrity Monitoring
                                        
                                    
                                    
                                    
                                        Forensic Analysis
                                        
                                    
                                    
                                    
                                        Log Management
                                        
                                    
                                    
                                    
                                        Network Monitoring
                                        
                                    
                                    
                                    
                                        Real Time Monitoring
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                            
                        Single Sign On
                                        Biometric
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Identity Federation
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Social Sign On
                                        
                                    
                                    
                                    
                                        User Management
                                        
                                    
                            
                        User Provisioning and Governance
                                        Access Governance
                                        
                                    
                                    
                                    
                                        Access Verification Workflow
                                        
                                    
                                    
                                    
                                        Audits / Reports
                                        
                                    
                                    
                                    
                                        Automatic Provisioning / Deprovisioning
                                        
                                    
                                    
                                    
                                        Delegated Access Authorization
                                        
                                    
                                    
                                    
                                        Identity Synchronization
                                        
                                    
                                    
                                    
                                        Lifecycle Management
                                        
                                    
                                    
                                    
                                        Multi-Factor Authentication (MFA)
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Policy Enforcement
                                        
                                    
                                    
                                    
                                        Single Sign-On (SSO)
                                        
                                    
                                    
                                    
                                        User Self-Service
                                        
                                    
                            
                         
         
         
         
         
         
        