KACE Unified Endpoint Manager Features
Top Rated KACE Unified Endpoint Manager Alternatives
(16)
4.9 out of 5
Visit Website
Sponsored
KACE Unified Endpoint Manager Categories on G2
Filter for Features
Operating System
Multi-Systems Support | Supports differing operating systems and mobile devices | Not enough data | |
Apple Support | Supports Apple devices | Not enough data | |
Android Support | Support Android devices | Not enough data |
Management
Applicatons Management | Centrally manages, configures, and oversees applications on employees' mobile devices | Not enough data | |
Applications Consolidation | Separates work apps and data from personal apps and data | Not enough data | |
Whitelist | Implements whitelist policy to easily and securely deploy recommended or required applications | Not enough data | |
Blacklist | Implements blacklist policy to block unwanted or suspicious applications | Not enough data | |
Usage Information | Offers visibility into employee mobile device activity | Not enough data | |
Device Enrollment | Registers employee-owned or company-distributed devices for IT access. | Not enough data | |
Device Configuration | Configures devices to seamlessly work with business-required applications, WiFi, VPN, etc. | Not enough data | |
Device Compliance | Ensures that employee devices are compliant with business regulations and requirements. | Not enough data | |
Usage Information | Offers visibility into employee device activity. | Not enough data | |
Data Separation | Separates personal data on devices from business-specific data. | Not enough data |
Security
Remote Wipe | Enable the remote locking down and encryption of employee mobile devices | Not enough data | |
Security | Protects employee, company, and data from potential vulnerabilities or malware | Not enough data | |
Reporting and Alerts | Creates custom reports and alerts about security updates, existing or upcoming software licenses, data access, and more. | Not enough data | |
Endpoint Protection | Protects employee, company, and data from potential vulnerabilities or malware. | Not enough data | |
Remote Wiping | Remotely clears all data from compromised devices. | Not enough data |
Platform - Mobile Device Management (MDM)
Regulation Compliant | Ensures that employees mobile devices are compliant with business regulations and requirements | Not enough data |
Administration
Compression | Minimizes image file size to optimize storage space | Not enough data | |
Automation | Allows administrators to automate or schedule OS deployments | Not enough data | |
Web Interface | Ability to access documents via a web interface without a client being installed on a device. | Not enough data | |
Administration Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | Not enough data |
Deployment
Device Variety | The ability to clone and deploy images from different kinds of devices | Not enough data | |
OS Variety | Supports imaging and deployment of multiple operating systems | Not enough data | |
Deployment Methods | Supports flexible scheduling and management methods for OS deployment | Not enough data |
Imaging
Remote Imaging | Allows administrators to capture OS images from a remote location | Not enough data | |
Offline imaging | Facilitates imaging of computer while requiring master boot | Not enough data | |
Online imaging | Allows imaging without suspending functionality of targeted endpoint | Not enough data |
Scope
Endpoint Inclusiveness | Manages numerous endpoint types, including mobile, desktop, IoT, and wearable. | Not enough data | |
Multi-OS Support | Supports diverse operating systems across several endpoint types. | Not enough data |