TaskTiley
TaskTiley
  • Leaderboard
  • Tools
  • Pricing
Sign inTry for free
HomeLeaderboardToolsPricingSign In

Category: IT & Security

ManageEngine

ManageEngine

IT management suite for monitoring, managing, and securing networks, endpoints, and IT services across on-premises, cloud, and hybrid environments. Offers modules for network monitoring, endpoint management, service desk operations, security, and analytics.

Daily Active Users<10
Apple Store
Google Play Store
Website
TikTok
Twitter
Norton

Norton

Cybersecurity suite for individuals and businesses, offering antivirus, malware protection, firewall, secure VPN, password management, and parental controls across devices and operating systems. Enables real-time threat detection and identity theft prevention through integrated security features.

Daily Active Users<10
Website
Twitter
YouTube
SolarWinds

SolarWinds

IT management platform for monitoring, managing, and securing networks, systems, and infrastructure. Offers tools for network performance monitoring, server and application management, IT security, and database administration across organizational environments.

Daily Active Users<10
Website
Twitter
YouTube
Okta

Okta

Cloud-based identity and access management platform for secure single sign-on, authentication, and user provisioning across enterprise applications. Enables centralized control over user access, supporting security and compliance for organizations of all sizes.

Daily Active Users<10
Website
Twitter
YouTube
Bitdefender

Bitdefender

Cybersecurity platform offering antivirus, endpoint protection, identity security, and privacy tools for individuals and businesses. Features include real-time malware detection, cloud-based threat monitoring, VPN access, password management, and anti-tracking for online privacy.

Daily Active Users<10
Website
TikTok
Twitter
Zabbix

Zabbix

Open-source monitoring platform for IT infrastructure, networks, servers, and applications. Provides real-time data collection, alerting, and visualization to help system administrators track performance and availability.

Daily Active Users<10
Website
GitHub
Reddit
CyberArk

CyberArk

Privileged access management platform for securing, monitoring, and controlling credentials and secrets across on-premises, cloud, and hybrid environments. Enables organizations to reduce risk by managing privileged accounts and enforcing least-privilege access.

Daily Active Users<10
Website
Twitter
YouTube
Malwarebytes

Malwarebytes

Cybersecurity software for detecting, blocking, and removing malware, ransomware, and other online threats across computers and mobile devices. Provides real-time protection, scheduled scanning, and remediation tools for both individuals and businesses.

Daily Active Users<10
Apple Store
Website
Twitter
YouTube
Dashlane

Dashlane

Password manager for storing, autofilling, and generating passwords across devices. Includes secure password sharing, payment data storage, and dark web monitoring to help users manage and protect credentials.

Daily Active Users<10
Website
Reddit
Twitter
LastPass

LastPass

Password manager for storing, autofilling, and generating secure credentials across devices. Offers encrypted vaults, cross-platform sync, and tools for individuals and businesses to manage sensitive information.

Daily Active Users<10
Apple Store
Google Play Store
Website
Twitter
Facebook
CrowdStrike

CrowdStrike

Cloud-based cybersecurity platform for endpoint protection, threat detection, and incident response. Uses real-time monitoring and threat intelligence to help organizations prevent and respond to cyber attacks across devices and networks.

Daily Active Users<10
Website
YouTube
LinkedIn

About IT & Security

Managing infrastructure, securing endpoints, and enforcing access controls require a unified approach as organizations scale. IT and security platforms centralize device management, monitor network activity, and automate patching to reduce manual oversight and close vulnerabilities. Many offer identity and access management, threat detection, and incident response workflows – supporting compliance with frameworks like SOC 2, ISO 27001, or GDPR. Integration with cloud providers, productivity suites, and authentication systems is standard, streamlining onboarding and reducing risk from shadow IT. Reporting tools surface suspicious behavior and track remediation efforts, giving teams clear visibility into system health and security posture. For distributed teams and hybrid environments, these platforms form the backbone of operational resilience and data protection.

FAQs