For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Endpoint Security Solutions

Cyber attacks are increasing across all industries, and cyber criminals are savvier than ever. Our endpoint security software makes it possible to automate imaging and deliver timely security patching using one of the largest industry patch libraries. Easily identify vulnerabilities to cybercrime with OVAL and SCAP scanning, and prevent malware infection or data theft by ensuring that every employee in your organization has the correct endpoint port and administration access.
Nick the IT Ninja Battles Endpoint Cybercrime with KACE 02:30

Capabilities

Protect your endpoints from a wide range of threats, including unpatched operating systems and applications, out-of-date software and improper security configurations, all with KACE endpoint systems management solutions.
Inventory and antivirus software distribution

Inventory and antivirus software distribution

Automate hardware and software inventory to gain greater network visibility so you can see which systems need anti-virus software or patches installed. Reduce the burden on your IT staff by automatically carrying out software distributions and software upgrades to Windows, Mac and Linux computers and servers across multiple locations. Easily integrate with Active Directory or other LDAP to efficiently align software deployment with your organization’s structure and user schedules.
Comprehensive patch management and vulnerability scanning

Comprehensive patch management and vulnerability scanning

Reduce infrastructure and resource costs by using a single patch management solution to ensure that your operating systems and leading third-party vendor applications are patched and up to date. Quickly discover vulnerabilities in your IT environment and identify systems that aren’t compliant with your security and configuration policies using powerful security audits. Employ Open Vulnerability and Assessment Language (OVAL) scanning for all managed Windows, Mac and Linux systems.
Access and privilege management

Access and privilege management

Reduce the risk of malware being downloaded and data leaving your business by ensuring that every employee in your organization has the correct endpoint port and administration access. Proactively provision and manage everything from Windows systems to secure endpoint devices, including USB ports. Run applications in a least-privileged environment to protect your data and centrally manage firewall settings and power consumption. Maintain the balance between security and user productivity while saving IT resources.

Resources

White Paper

5 Steps to Battle Endpoint Cybercrime with KACE

The Quest unified endpoint management solution, including KACE SMA, helps safeguard all your endpoints, cut IT workloads & adhe...
White Paper

Secure your endpoints: Don't fall victim to cyberattacks

Follow our endpoint security guidelines to address cybersecurity concerns and explore how Quest’s Unified Endpoint Management s...
White Paper

Quest® Unified Endpoint Management in Healthcare Organizations

Unified Endpoint Management in Healthcare Organizations
White Paper

Quest® Unified Endpoint Management for Education

See how Quest's unified endpoint management solution (UEM) offers a unified approach to endpoint security and management to hel...
White Paper

2 Steps to Achieve Endpoint Compliance with KACE

Maintain systemwide endpoint compliance using KACE unified endpoint management (UEM) solutions to replace manual efforts.
Case Study

University saves time and costs by streamlining systems management

Anhalt University uses the KACE Systems Management Appliance to quickly inventory, image, manage, maintain and patch hundreds o...
Case Study

School district enables digital curriculum while saving $100,000

To efficiently manage 30,000 desktops and laptops, Seminole County Public Schools replaced multiple existing systems with KACE®...
Case Study

Rehabilitative service provider streamlines endpoint management

Fundação CASA gains visibility, ensures compliance and reduces administrative overhead with the cloud-based KACE® Systems Manag...