Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
                    Automox is a cloud-native solution that is accessible worldwide, providing effective management for OS and third-party patches, security settings, and custom scripts across Windows, Mac, and Linux systems through a user-friendly console. This platform allows IT and SecOps teams to swiftly gain oversight and control over on-premises, remote, and virtual endpoints, eliminating the need for expensive infrastructure deployment. By streamlining these processes, Automox enhances operational efficiency and strengthens security measures across diverse environments.
                
            
        
            Description
                    SafeGuard Cyber is a SaaS security platform providing cloud-native defense for critical cloud communication applications that organizations are increasingly reliant upon, such as Microsoft Teams, Slack, Zoom, Salesforce, and social media. 
A blind-spot is growing for security operations as adoption of these tools increases, creating more risk and vulnerability to ransomware, business compromise, and confidential information leakage. Email security lacks the ability to both create visibility outside of email, and primarily defend against malicious files and links. CASB/SASE solutions are difficult to deploy and manage, and the control function is typically left “open” to prevent false positives from affecting business productivity
Our platform’s agentless architecture creates a portable security layer wherever your workforce communicates, no matter the device or network. Manage day-to-day business communication risk extending beyond email and into enterprise collaboration applications. Secure your business by protecting the human attack vector from advanced social engineering and targeted threats.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    CrowdStrike Falcon
            
            
        
        
    
        
        
            
                
    Axonius
            
            
        
        
    
        
        
            
                
    Blink
            
            
        
        
    
        
        
            
                
    Freshservice
            
            
        
        
    
        
        
            
                
    Global Relay
            
            
        
        
    
        
        
            
                
    Indent
            
            
        
        
    
        
        
            
                
    JumpCloud
            
            
        
        
    
        
        
            
                
    JupiterOne
            
            
        
        
    
        
        
            
                
    Lucidum
            
            
        
        
    
        
        
            
                
    OctoXLabs
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Integrations
            
                
    CrowdStrike Falcon
            
            
        
        
    
        
        
            
                
    Axonius
            
            
        
        
    
        
        
            
                
    Blink
            
            
        
        
    
        
        
            
                
    Freshservice
            
            
        
        
    
        
        
            
                
    Global Relay
            
            
        
        
    
        
        
            
                
    Indent
            
            
        
        
    
        
        
            
                
    JumpCloud
            
            
        
        
    
        
        
            
                
    JupiterOne
            
            
        
        
    
        
        
            
                
    Lucidum
            
            
        
        
    
        
        
            
                
    OctoXLabs
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Pricing Details
        $3.00
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Automox
Founded
2015
Country
United States
Website
www.automox.com
Vendor Details
Company Name
SafeGuard Cyber
Country
United States
Website
www.safeguardcyber.com/
Product Features
Computer Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Audit Trail
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Database Security Audit
                                        
                                    
                                    
                                    
                                        File Access Control
                                        
                                    
                                    
                                    
                                        Financial Data Protection
                                        
                                    
                                    
                                    
                                        Maintenance Scheduling
                                        
                                    
                                    
                                    
                                        Real Time Monitoring
                                        
                                    
                                    
                                    
                                        Security Event Log
                                        
                                    
                                    
                                    
                                        Virus Definition Update
                                        
                                    
                                    
                                    
                                        Vulnerability Protection
                                        
                                    
                            
                        Endpoint Detection and Response (EDR)
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Blacklisting/Whitelisting
                                        
                                    
                                    
                                    
                                        Continuous Monitoring
                                        
                                    
                                    
                                    
                                        Malware/Anomaly Detection
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Remediation Management
                                        
                                    
                                    
                                    
                                        Root Cause Analysis
                                        
                                    
                            
                        Endpoint Protection
                                        Activity Log
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Device Management
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Signature Matching
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        IT Asset Management
                                        Asset Tracking
                                        
                                    
                                    
                                    
                                        Audit Management
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Configuration Management
                                        
                                    
                                    
                                    
                                        Contract/License Management
                                        
                                    
                                    
                                    
                                        Cost Tracking
                                        
                                    
                                    
                                    
                                        Depreciation Management
                                        
                                    
                                    
                                    
                                        IT Service Management
                                        
                                    
                                    
                                    
                                        Inventory Management
                                        
                                    
                                    
                                    
                                        Maintenance Management
                                        
                                    
                                    
                                    
                                        Procurement Management
                                        
                                    
                                    
                                    
                                        Requisition Management
                                        
                                    
                                    
                                    
                                        Supplier Management
                                        
                                    
                            
                        IT Management
                                        Capacity Monitoring
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Event Logs
                                        
                                    
                                    
                                    
                                        Hardware Inventory
                                        
                                    
                                    
                                    
                                        IT Budgeting
                                        
                                    
                                    
                                    
                                        License Management
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Remote Access
                                        
                                    
                                    
                                    
                                        Scheduling
                                        
                                    
                                    
                                    
                                        Software Inventory
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                            
                        IT Service
                                        Contract Management
                                        
                                    
                                    
                                    
                                        IT Asset Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Knowledge Management
                                        
                                    
                                    
                                    
                                        Release Management
                                        
                                    
                                    
                                    
                                        Self Service Portal
                                        
                                    
                                    
                                    
                                        Service Catalog
                                        
                                    
                                    
                                    
                                        Service Reporting
                                        
                                    
                                    
                                    
                                        Ticket Management
                                        
                                    
                            
                        MSP
                                        Backup Management
                                        
                                    
                                    
                                    
                                        Billing & Invoicing
                                        
                                    
                                    
                                    
                                        CRM
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        Help Desk
                                        
                                    
                                    
                                    
                                        Issue Management
                                        
                                    
                                    
                                    
                                        Live Chat
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Privileged Access Management (PAM)
                                        
                                    
                                    
                                    
                                        Project Management
                                        
                                    
                                    
                                    
                                        Remote Access
                                        
                                    
                                    
                                    
                                        Remote Systems Monitoring
                                        
                                    
                                    
                                    
                                        Scheduling
                                        
                                    
                            
                        Patch Management
                                        Alerts/Notifications
                                        
                                    
                                    
                                    
                                        Automatic Approval
                                        
                                    
                                    
                                    
                                        Automatic Patch Deployment
                                        
                                    
                                    
                                    
                                        Automatic Scans
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Custom Patches
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        Network Wide Management
                                        
                                    
                                    
                                    
                                        Patch Prioritization
                                        
                                    
                                    
                                    
                                        Patch Testing
                                        
                                    
                                    
                                    
                                        Remote Access/Control
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        Vulnerability Management
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Asset Tagging
                                        
                                    
                                    
                                    
                                        Network Scanning
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vulnerability Assessment
                                        
                                    
                                    
                                    
                                        Web Scanning
                                        
                                    
                            
                        Product Features
Application Security
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Open Source Component Monitoring
                                        
                                    
                                    
                                    
                                        Source Code Analysis
                                        
                                    
                                    
                                    
                                        Third-Party Tools Integration
                                        
                                    
                                    
                                    
                                        Training Resources
                                        
                                    
                                    
                                    
                                        Vulnerability Detection
                                        
                                    
                                    
                                    
                                        Vulnerability Remediation
                                        
                                    
                            
                        Compliance
                                        Archiving & Retention
                                        
                                    
                                    
                                    
                                        Artificial Intelligence (AI)
                                        
                                    
                                    
                                    
                                        Audit Management
                                        
                                    
                                    
                                    
                                        Compliance Tracking
                                        
                                    
                                    
                                    
                                        Controls Testing
                                        
                                    
                                    
                                    
                                        Environmental Compliance
                                        
                                    
                                    
                                    
                                        FDA Compliance
                                        
                                    
                                    
                                    
                                        HIPAA Compliance
                                        
                                    
                                    
                                    
                                        ISO Compliance
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        OSHA Compliance
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Sarbanes-Oxley Compliance
                                        
                                    
                                    
                                    
                                        Surveys & Feedback
                                        
                                    
                                    
                                    
                                        Version Control
                                        
                                    
                                    
                                    
                                        Workflow / Process Automation
                                        
                                    
                            
                        Computer Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Audit Trail
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Database Security Audit
                                        
                                    
                                    
                                    
                                        File Access Control
                                        
                                    
                                    
                                    
                                        Financial Data Protection
                                        
                                    
                                    
                                    
                                        Maintenance Scheduling
                                        
                                    
                                    
                                    
                                        Real Time Monitoring
                                        
                                    
                                    
                                    
                                        Security Event Log
                                        
                                    
                                    
                                    
                                        Virus Definition Update
                                        
                                    
                                    
                                    
                                        Vulnerability Protection
                                        
                                    
                            
                        Endpoint Protection
                                        Activity Log
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Device Management
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Signature Matching
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        IT Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Anti Virus
                                        
                                    
                                    
                                    
                                        Email Attachment Protection
                                        
                                    
                                    
                                    
                                        Event Tracking
                                        
                                    
                                    
                                    
                                        IP Protection
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Spyware Removal
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Web Traffic Reporting
                                        
                                    
                            
                        Vulnerability Management
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Asset Tagging
                                        
                                    
                                    
                                    
                                        Network Scanning
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vulnerability Assessment
                                        
                                    
                                    
                                    
                                        Web Scanning
                                        
                                    
                            
                         
         
         
         
        