TOPdesk References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (3020)
    Verified68+ References
  • 4.7 / 5.0 (3532)
    63+ References
  • 4.8 / 5.0 (999)
    Verified8+ References

TOPdesk Case Studies

  • Bath Spa University - Customer Case Study

  • How This Managed Service Provider Empowers Their Service Users With a Helpdesk Tool

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References68 total
    About

    Device42 is the most comprehensive agentless discovery system for Hybrid IT available today. Device42 can continuously discover, map, and optimize infrastructure and applications across data centers and cloud, providing accurate views of your IT ecosystem. Device42 intelligently groups discovered workloads by application affinities, dramatically reducing the effort required to create move groups, capturing all communications. Customers in more than 60 countries including Global 2000 clients and Systems Integrators use these capabilities as they manage and modernize their IT infrastructure and application landscapes and adopt DevOps practices.

  • Reference Rating
    4.7 / 5.0
    Customer References63 total
    About

    Giva Service Management Suite delivers an intuitive, easy-to-use design that can be deployed in just days and requires only one hour of training. Giva's robust, fast and painless reporting analytics KPIs quickly measure team productivity, responsiveness and customer satisfaction, resulting in faster and higher quality decision-making. Customization and configuration are all point and click with no programming or consultants required to deliver a substantially lower total cost of ownership.

  • Reference Rating
    4.7 / 5.0
    Customer References8 total
    About

    Panaseer is the first Continuous Controls Monitoring platform for enterprise security. They help stakeholders to make informed, risk-based security decisions. Their platform shows you every asset, application, user and data set across your IT estate in real-time. This identifies gaps in controls coverage, aligns security with framework standards and substantiates regulatory compliance.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked