Ivanti Management Suite, powered by LANDESK

(56)
4.2 out of 5 stars

Ivanti Management Suite, powered by LANDESK is a client management software that integrates with multiple IT solutions and gain visibility into what devices user's have and boost IT and user productivity.

Work for Ivanti Management Suite, powered by LANDESK?

Learning about Ivanti?

We can help you find the solution that fits you best.

Find the Right Product

Ivanti Management Suite, powered by LANDESK Features

System Control
Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

91%
(Based on 7 reviews)
System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

Not enough data available

Device Control

Manages user network accessibility on laptops and mobile devices.

88%
(Based on 6 reviews)
Web Control

Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.

Not enough data available

Application Control

Blocks endpoint users from accessing restricted applications.

Not enough data available

Platform - Mobile Device Management (MDM)
Regulation Compliant

Ensures that employees mobile devices are compliant with business regulations and requirements

Not enough data available

Platform
Regulation Compliant

Ensures that employees mobile devices are compliant with business regulations and requirements

Not enough data available

Device Enrollment

Registers employee-owned or company-distributed mobile devices for IT access

Not enough data available

Device Configuration

Configures mobile devices to seamlessly work with business-required applications, WiFi, VPN, etc.

Not enough data available

Analysis
Threat Detection

Collects and curates data insight about the performance and health of a company's system.

85%
(Based on 11 reviews)
Vulnerability Prevention
Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data available

Firewall

Protects endpoint devices from a variety of attacks and malware threats.

Not enough data available

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data available

Operating System
Multi-Systems Support

Supports differing operating systems and mobile devices

Not enough data available

Apple Support

Supports Apple devices

Not enough data available

Android Support

Support Android devices

Not enough data available

Operating System
Multiple Mobile Operating System Support

Supports differing operating systems and mobile devices

Not enough data available

Apple Support

Supports Apple devices

Not enough data available

Android Support

Support Android devices

Not enough data available

Platform
Unified Communications Platform

Facilitates communication between users and administrators.

81%
(Based on 11 reviews)
Remote Access

Allows end users to remotely access to company's IT database.

90%
(Based on 19 reviews)
ITIL Policy Compliance

Helps organizations establish, implement, and adhere to ITIL regulation.

Not enough data available

Asset Tracking

Tracks IT assets and financial data.

84%
(Based on 15 reviews)
IT Knowledge Management

Integrates all IT service support functions for consistency and accuracy.

89%
(Based on 7 reviews)
Security Management
Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data available

Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

Not enough data available

Compliance

Monitors assets and enforces security policies to audit assets and infrastructure security.

85%
(Based on 5 reviews)
Management
Applicatons Management

Centrally manages, configures, and oversees applications on employees' mobile devices

Not enough data available

Applications Consolidation

Separates work apps and data from personal apps and data

Not enough data available

Whitelist

Implements whitelist policy to easily and securely deploy recommended or required applications

Not enough data available

Blacklist

Implements blacklist policy to block unwanted or suspicious applications

Not enough data available

Usage Information

Offers visibility into employee mobile device activity

Not enough data available

Security
Device Management

Unifies endpoint management of employee devices

Not enough data available

Custom Alerts

Creates custom reports and alerts about existing or upcoming software licenses and security updates

Not enough data available

Security

Protects employee, company, and data from potential vulnerabilities or malware

Not enough data available

Security
Endpoint Protection

Allows the IT team to oversee all possible endpoints in a single source of reference.

88%
(Based on 10 reviews)
Patch Management

Automates the updating of security measures on enterprise devices.

90%
(Based on 17 reviews)
Disaster Recovery

Provides cloud backup or disaster recovery solution to protect enterprise data and applications.

73%
(Based on 6 reviews)
Service Management

Utilizes data to proactively identify and prioritize IT issues.

83%
(Based on 8 reviews)
Workflow Management

Creates new or streamlines existing workflows to better handle IT support tickets and service.

76%
(Based on 7 reviews)
Security
Remote Wipe

Enable the remote locking down and encryption of employee mobile devices

Not enough data available

Security

Protects employee, company, and data from potential vulnerabilities or malware

Not enough data available

Management
Applicatons Management

Centrally manages, configures, and oversees applications on employees' mobile devices

Not enough data available

Applications Consolidation

Separates work apps and data from personal apps and data

Not enough data available

Whitelist

Implements whitelist policy to easily and securely deploy recommended or required applications

Not enough data available

Blacklist

Implements blacklist policy to block unwanted or suspicious applications

Not enough data available

Usage Information

Offers visibility into employee mobile device activity

Not enough data available