Average Ratings 1 Rating
Average Ratings 0 Ratings
Description
Transform the way IT protects laptops and desktops, smartphones, tablet, wearables, and the Internet of Things. IBM MaaS360® protects devices, apps, content and data so you can rapidly scale your remote workforce and bring-your-own-device (BYOD) initiatives while building a zero trust strategy with modern device management. You can also use artificial intelligence (AI), contextual analytics, to gain actionable insights.
Rapid deployment across leading operating systems and devices allows you to manage and protect your remote workers in minutes.
Upgrade to the paid version to start using the full product. All settings and device enrollments will be retained. Our product support team will be available to you 24x7.
Integrate MaaS360 into your existing technologies, and use its endpoint security built-in to keep your total costs of ownership where you desire.
Description
The contemporary business landscape requires swift, enterprise-wide implementation that allows for seamless management of applications, devices, and networks from any location. With employees dispersed across offices, on-site locations, and remote settings, K7 Cloud Endpoint Security (K7 CEPS) offers an effortless solution for safeguarding and overseeing all endpoints in a perimeter-less IT environment. The dedicated and knowledgeable customer support team ensures that cybersecurity remains a seamless part of continuous operations around the clock. The solution delivers strong defenses against a variety of threats, including ransomware, Trojans, phishing attacks, advanced persistent threats (APTs), and zero-day vulnerabilities that specifically target organizations. By utilizing a cloud console, businesses can eliminate restrictions based on time and place, allowing for comprehensive management of cybersecurity measures through a simple web browser interface. Additionally, this system allows for straightforward remote deployment, ensuring protection extends to devices used by employees who may never set foot in the office. Ultimately, K7 CEPS not only enhances security but also supports the flexibility and productivity of a modern, mobile workforce.
API Access
Has API
API Access
Has API
Integrations
Akitra Andromeda
Axonius
Bigtincan
CentreStack
Check Point IPS
Check Point Infinity
ConnectWise RMM
CopperheadOS
Cynerio
ExpenseSmart
Integrations
Akitra Andromeda
Axonius
Bigtincan
CentreStack
Check Point IPS
Check Point Infinity
ConnectWise RMM
CopperheadOS
Cynerio
ExpenseSmart
Pricing Details
$5/device and $10/user/month
Free Trial
Free Version
Pricing Details
$70 one-time payment
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
IBM
Founded
1911
Country
United States
Website
www.ibm.com/products/maas360
Vendor Details
Company Name
K7 Computing
Founded
1991
Country
India
Website
www.k7computing.com/us/business-users/endpoint-security/k7-cloud-EPS
Product Features
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
Mobility
App Management
Barcode Scanning
Compliance Management
Content Management
Data Collection
Data Management
File Management
Forms Automation
Mobile Messaging
Remote Access
Remote Systems Monitoring
Product Features
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting