As an IT professional, I have been using LogMeIn Central for several months now to manage and monitor my organisation's endpoint infrastructure. Overall, I have found the software to be comprehensive in terms of its features, but average in terms of performance and advanced capabilities.
One of the standout features of LogMeIn Central is its wide range of capabilities for endpoint management. From remote control and asset management to patch management and software deployment, this software offers a range of tools that are useful for IT professionals. I particularly appreciated the security features, such as password protection and two-factor authentication, which help to protect against unauthorised access.
However, while LogMeIn Central is relatively easy to use and offers a user-friendly interface, I did experience some performance issues. The software can be slow at times, particularly when attempting to access remote devices, which can be frustrating. Additionally, while the software offers a good range of features, it lacks some advanced capabilities that are offered by other endpoint management solutions, such as advanced reporting and analytics.
In terms of pricing, LogMeIn Central is somewhat expensive compared to other endpoint management software on the market. While it may be worth the investment for larger organisations with more complex endpoint infrastructure, smaller businesses may find it too costly.
Thycotic - The most full-featured privileged access management (PAM) solution available is easy to use, well adopted and affordable. Start your free 30-day trial here.
ESET Endpoint Security - ESET internet security solutions deliver proactive, multi-layered protection, including antivirus, anti-phishing, exploit blocker and more, to protect the business from all known and emerging malware and threats.
Deception Services - Paladin Deception Services is here to assist you in obtaining the fictitious reference, the little white lie, or the alibi that you need.
Symantec Endpoint Encryption - Symantec Endpoint Encryption protects the sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.
CrowdStrike Services - Protect your organization by limiting or eliminating exposure and damage from cyber attacks with proactive, incident response and remediation services.
Kaspersky Endpoint Security - Our HuMachine™-based, Next Generation endpoint security delivers multi-layered protection for multiple platforms – including Linux servers and endpoints – to detect suspicious behavior and block threats, including ransomware.