Automox References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (3945)
    161+ References
  • 4.7 / 5.0 (5460)
    Premium592+ References
  • 4.8 / 5.0 (986)
    Verified14+ References

Automox Videos

  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References161 total
    About

    Absolute Software Corporation (TSX: ABT) is the industry standard in persistent endpoint security and management for computers, laptops, tablets and smartphones. Absolute Software is a leader in device security and management tracking for 20 years, has over 30,000 commercial customers worldwide. Absolute’s solutions – Computrace®, Absolute Manage®, Absolute Service, and Absolute LoJack – provide organizations with actionable intelligence to prove compliance, securely manage BYOD, and deliver comprehensive visibility and control over all of their devices and data. Absolute is positioned on two Gartner, Inc. Magic Quadrants - the Magic Quadrant for Client Management Tools and the Magic Quadrant for Mobile Device Management Software.

  • Reference Rating
    4.7 / 5.0
    Customer References592 total
    About

    Barracuda provides cloud-connected security and storage solutions that simplify IT. These powerful, easy-to-use and affordable solutions are trusted by more than 150,000 organizations worldwide and are delivered in appliance, virtual appliance, cloud and hybrid deployments. Barracuda’s customer-centric business model focuses on delivering high-value, subscription-based IT solutions that provide end-to-end network and data security.

  • Reference Rating
    4.7 / 5.0
    Customer References14 total
    About

    Virsec provides Zero Trust cybersecurity for legacy and modern workloads with the Virsec Security Platform (VSP). Using a default-deny, allow-on-trust security compensating control, VSP protects applications and workloads by proactively preventing cyber-attacks in milliseconds. VSP ensures only trusted code is allowed to run and stops everything else. With this proactive approach, workloads are immune to ever-evolving threat actor techniques and are protected against unpatched vulnerabilities.