RMM Main Features
Remote Monitoring and Management
Microsoft 365 Management
The Microsoft 365 management feature enables seamless integration of both platforms. With just a few clicks, you can access a comprehensive overview of your tenants, users, and associated devices.
Advanced Software Management
Advanced Software Management enhances the existing Software Management framework within the RMM, providing users with access to an expanded list of applications to further secure device software against online threats and vulnerabilities.
Flexible Patch Management
The RMM’s built-in patch management software helps you automate patch policies and keep client machines secure from the latest threats.
Monitoring, Automation and Scripting
Powerful RMM scripts and automated policies, such as native Ransomware Detection, are the driving force behind Datto RMM. Administrators have control over when, where, and how automated tasks are executed, enhancing productivity significantly.
Anti-Virus Protection
Protect your business against sophisticated cyber threats with AI-driven, next-generation antivirus protection.
Advanced Threat Prevention
Utilise AI, machine learning, and the latest threat intelligence to proactively identify and block zero-day and polymorphic threats, ensuring your business remains ahead of attackers.
Seamless Performance
Enjoy top-tier security without compromising performance. The AV is designed for efficiency, preserving system speed and user productivity.
Comprehensive Real-time Protection
Benefit from real-time scanning and automatic threat blocking with advanced unpacking capabilities, ensuring an immediate response to any cyber threat.
Global Threat Intelligence
Utilise cloud-based global threat intelligence for up-to-date protection. The AV’s cloud infrastructure continuously updates with the latest threat data, providing superior defence mechanisms.
EDR Ransomware Detection
The EDR’s ransomware detection monitors endpoints for crypto-ransomware using proprietary behavioural analysis of files. Upon detecting ransomware, The EDR can alert you, isolate the device, and attempt to halt the ransomware processes to prevent the infection from spreading.
Know about ransomware infections instantly
Instead of waiting for a user to report an issue, The EDR platform will notify you when files are encrypted by ransomware. This gives you more time to respond and potentially prevent the spread.
Easily monitor by using policy-driven configuration
The EDR’s policy-driven approach allows us/you to efficiently monitor targeted devices at scale for ransomware. Integrations with essential tools, such as the RMM, along with email and webhook notification options, ensure immediate alerts to the appropriate resources if ransomware is detected.
Prevent spreading of ransomware with automatic network isolation and termination of ransomware processes
Upon detecting ransomware, The EDR can isolate the affected device from the network and attempt to halt suspected ransomware processes, preventing the infection from spreading to other devices.
Remediate issues remotely
Devices automatically isolated from the network can still communicate with the EDR platform, allowing us/you to take effective action to resolve the issue.
Advanced Software Management
While the RMM’s standard Software Management functionality updates key applications, the Advanced Software Management module incorporates a broader library of software applications and allows for both installation and uninstallation through a Software Management policy.
Expands the RMM’s existing third-party patching coverage
200+ out-of-the-box third-party software applications. The application catalog will continue to grow.
Automates software updates
The latest software versions are uploaded to the catalogue, involving verification of software integrity and ensuring compatibility. Tier-based categorisation prioritises software updates based on their importance and operational impact.
Ability to uninstall applications
Configure unapproved software for uninstall
Device-level visibility and reporting
Endpoint Detection and Response (EDR)
As many as 77% of advanced threats bypass up-to-date antivirus products
Click-to-respond
Take action against advanced threats directly from your alert dashboard. Isolate hosts, terminate processes, delete files, and more without wasting valuable time.
Detect fileless attacks with behavioral analysis
The EDR features patented deep memory analysis, ensuring you are informed of even the most elusive threat actors.
MITRE ATT&CK mapping
Our alerts are mapped to the MITRE ATT&CK framework, providing context and clarity to your team, thereby reducing the security expertise needed for effective response.
Smart Recommendations
Our experienced SOC analysts have leveraged their expertise to develop automated mitigation recommendations for today’s advanced threats.
Managed Detection and Response (MDR) with Managed SOC
Secure and Protect Clients with Managed SOC– No Hardware Required
**Premium Only**
Continuous monitoring
The Managed SOC’s real-time threat detection enables you and your clients to relax knowing you have around the clock protection.
World-class security stack
The Managed SOC was purpose-built to provide world class service and is backed by over 50 years of cybersecurity experience.
Breach detection
Take your breach detection to the next level by detecting attacks that evade traditional cyber defences.
Threat hunting
Respond to the latest threats with our elite security analyst team that proactively hunts for malicious activity and helps you respond.
Backup Services
Endpoint Backup uses image-based backup technology, removing the need to procure or manage additional hardware. It provides software-only Windows backup directly to the Cloud, ensuring your data is protected no matter what.
Image-based technology
Back up directly to the Cloud with our appliance-free cloud backup solution.
Reliable cloud backup
Easily restore individual files or restore the entire image to a new device. Completely self service.
Recover From Ransomware or Hardware Failure
Recover individual files and folders or perform a complete bare-metal restore of the old machine to the same or different hardware without needing to reinstall the OS or reconfigure applications. Easily recover files and folders using point-in-time snapshot recovery.
Meet Stringent Client Recovery Objectives
Windows endpoints are automatically backed up every two hours to meet stringent RPO requirements. Recovery is streamlined through a user-friendly interface that facilitates the restoration of multiple files, folders, or the entire disk as needed.
Remote Support
Remote support enables technicians to diagnose and resolve issues on devices from any location, ensuring swift assistance and minimal downtime.
**Ultimate Only**
Real-Time Troubleshooting
Allows technicians to diagnose and fix issues instantly, reducing downtime and improving efficiency.
Multi-Platform Compatibility
Supports a wide range of operating systems and devices, ensuring comprehensive support capabilities.
Secure Access
Utilises encryption and authentication protocols to ensure secure connections and protect sensitive data.
File Transfer Capability
Enables the easy transfer of files between the technician and the user’s device, facilitating quick resolution of software issues and updates.