Features

Created with Sketch.

RMM Main Features

Remote Monitoring and Management

Microsoft 365 Management

The Microsoft 365 management feature enables seamless integration of both platforms. With just a few clicks, you can access a comprehensive overview of your tenants, users, and associated devices.

Advanced Software Management

Advanced Software Management enhances the existing Software Management framework within the RMM, providing users with access to an expanded list of applications to further secure device software against online threats and vulnerabilities.

Flexible Patch Management

The RMM’s built-in patch management software helps you automate patch policies and keep client machines secure from the latest threats.

Monitoring, Automation and Scripting

Powerful RMM scripts and automated policies, such as native Ransomware Detection, are the driving force behind Datto RMM. Administrators have control over when, where, and how automated tasks are executed, enhancing productivity significantly.

Anti-Virus Protection

Protect your business against sophisticated cyber threats with AI-driven, next-generation antivirus protection.

Advanced Threat Prevention

Utilise AI, machine learning, and the latest threat intelligence to proactively identify and block zero-day and polymorphic threats, ensuring your business remains ahead of attackers.

Seamless Performance

Enjoy top-tier security without compromising performance. The AV is designed for efficiency, preserving system speed and user productivity.

Comprehensive Real-time Protection

Benefit from real-time scanning and automatic threat blocking with advanced unpacking capabilities, ensuring an immediate response to any cyber threat.

Global Threat Intelligence

Utilise cloud-based global threat intelligence for up-to-date protection. The AV’s cloud infrastructure continuously updates with the latest threat data, providing superior defence mechanisms.

EDR Ransomware Detection

The EDR’s ransomware detection monitors endpoints for crypto-ransomware using proprietary behavioural analysis of files. Upon detecting ransomware, The EDR can alert you, isolate the device, and attempt to halt the ransomware processes to prevent the infection from spreading.

Know about ransomware infections instantly

Instead of waiting for a user to report an issue, The EDR platform will notify you when files are encrypted by ransomware. This gives you more time to respond and potentially prevent the spread.

Easily monitor by using policy-driven configuration

The EDR’s policy-driven approach allows us/you to efficiently monitor targeted devices at scale for ransomware. Integrations with essential tools, such as the RMM, along with email and webhook notification options, ensure immediate alerts to the appropriate resources if ransomware is detected.

Prevent spreading of ransomware with automatic network isolation and termination of ransomware processes

Upon detecting ransomware, The EDR can isolate the affected device from the network and attempt to halt suspected ransomware processes, preventing the infection from spreading to other devices.

Remediate issues remotely

Devices automatically isolated from the network can still communicate with the EDR platform, allowing us/you to take effective action to resolve the issue.

Advanced Software Management

While the RMM’s standard Software Management functionality updates key applications, the Advanced Software Management module incorporates a broader library of software applications and allows for both installation and uninstallation through a Software Management policy.

Expands the RMM’s existing third-party patching coverage

200+ out-of-the-box third-party software applications. The application catalog will continue to grow.

Automates software updates

The latest software versions are uploaded to the catalogue, involving verification of software integrity and ensuring compatibility. Tier-based categorisation prioritises software updates based on their importance and operational impact.

Ability to uninstall applications

Configure unapproved software for uninstall

Device-level visibility and reporting

Endpoint Detection and Response (EDR)

As many as 77% of advanced threats bypass up-to-date antivirus products

Click-to-respond

Take action against advanced threats directly from your alert dashboard. Isolate hosts, terminate processes, delete files, and more without wasting valuable time.

Detect fileless attacks with behavioral analysis

The EDR features patented deep memory analysis, ensuring you are informed of even the most elusive threat actors.

MITRE ATT&CK mapping

Our alerts are mapped to the MITRE ATT&CK framework, providing context and clarity to your team, thereby reducing the security expertise needed for effective response.

Smart Recommendations

Our experienced SOC analysts have leveraged their expertise to develop automated mitigation recommendations for today’s advanced threats.

Managed Detection and Response (MDR) with Managed SOC

Secure and Protect Clients with Managed SOC– No Hardware Required
**Premium Only**

Continuous monitoring

The Managed SOC’s real-time threat detection enables you and your clients to relax knowing you have around the clock protection.

World-class security stack

The Managed SOC was purpose-built to provide world class service and is backed by over 50 years of cybersecurity experience.

Breach detection

Take your breach detection to the next level by detecting attacks that evade traditional cyber defences.

Threat hunting

Respond to the latest threats with our elite security analyst team that proactively hunts for malicious activity and helps you respond.

Backup Services

Endpoint Backup uses image-based backup technology, removing the need to procure or manage additional hardware. It provides software-only Windows backup directly to the Cloud, ensuring your data is protected no matter what.

Image-based technology

Back up directly to the Cloud with our appliance-free cloud backup solution.

Reliable cloud backup

Easily restore individual files or restore the entire image to a new device. Completely self service.

Recover From Ransomware or Hardware Failure

Recover individual files and folders or perform a complete bare-metal restore of the old machine to the same or different hardware without needing to reinstall the OS or reconfigure applications. Easily recover files and folders using point-in-time snapshot recovery.

Meet Stringent Client Recovery Objectives

Windows endpoints are automatically backed up every two hours to meet stringent RPO requirements. Recovery is streamlined through a user-friendly interface that facilitates the restoration of multiple files, folders, or the entire disk as needed.

Remote Support

Remote support enables technicians to diagnose and resolve issues on devices from any location, ensuring swift assistance and minimal downtime.
**Ultimate Only**

Real-Time Troubleshooting

Allows technicians to diagnose and fix issues instantly, reducing downtime and improving efficiency.

Multi-Platform Compatibility

Supports a wide range of operating systems and devices, ensuring comprehensive support capabilities.

Secure Access

Utilises encryption and authentication protocols to ensure secure connections and protect sensitive data.

File Transfer Capability

Enables the easy transfer of files between the technician and the user’s device, facilitating quick resolution of software issues and updates.