Book a Demo
Book A Demo
Your fleet represented in thousands of data points
Security & Compliance Checks
Monitor your entire Linux, Mac, and Windows fleet
Self-Remediation via Slack App
Engage end-users on Slack to self-remediation issues
Measure, achieve, and maintain your compliance goals
Gain Fleet Visibility
Become "all knowing" across Linux, Mac, and Windows
Implement Honest Security
Make security a core value in your company's culture
Company: We're Hiring!
From the blog
Presenting the Sensitive Data Report
Your Company's Bossware Could Get You in Legal Trouble
Announcing Kolide's $17MM Series B
Kolide has a multitude of checks to help you measure and achieve your organization's compliance and security goals.
Achieve your security and compliance goals with ease.
No SQL Queries to Write
User/Okta Driven Remediation
Security Training for End-Users
You can use Device Checks to...
Find and Securely Store 1Password Emergency Kits
1Password Emergency Kits usually contain the account's secret key and maybe even the master password. It's important that they are secured.
Find Non-Genuine Windows Installations and Activate Them
Non-Genuine Windows is highly correlated with malware infection and the presence of other pirated software.
Find and Secure Plain-Text GitHub 2FA Backup Codes
Github Two-Factor backup codes are as good as real passwords. It's important that they are secured.
Block GitHub Copilot
Github Copilot can put the IP rights of your code at risk. You may want to block engineers from using it.
Block iCloud Private Relay
Disabling iCloud Private Relay on macOS may be good idea if it conflicts with an existing VPN or network auditing requirements.
Configure macOS Firewall to Block Unauthorized Connections
The macOS firewall comes disabled by default, but should be enabled whenever possible.
Find Macs with Remote Login Enabled and Disable it
Remote Login is essentially a Remote SSH server which can reduce the security of your Macs.
Find Macs With SIP Disabled and Enable It
SIP protects Macs by preventing them from running unauthorized code. It should be enabled.
Ensure Ubuntu’s Unattended Upgrades Are Turned On
Enabling Unattended Upgrades ensures critical software on Ubuntu remains patched automatically. It's a must-have.
Find Unencrypted SSH Keys and Encrypt Them
SSH keys are commonly used to sign into servers, push code, and verify identities. It's important they are password-protected.
Ensure Windows' Ransomware Protection is Enabled
Controlled Folder Access is the easiest way to stop ransomware, but isn't enabled by default.