This is not just production osquery, but actually a way bigger opportunity than even something like Airwatch or Jamf.
Eric Tan
CIO & Chief Security Officer at Flock Safety
Deploy software your own way
Deploy software from any source using the method that works best for you—whether it's through the UI, API, or GitOps.
Install from a built-in catalog of Fleet-maintained apps without the need for additional configuration.
Upload any third-party software as a custom package to deploy all of the tools your end users need.
Manage app deployments and updates for your computers and mobile devices from app stores.
Automate patch management
Take the guesswork out of keeping devices up-to-date and secure by asking yes or no questions tied to automations.
Use policy automations to trigger app updates, execute scripts, or create tickets in Jira and Zendesk.
Generate webhooks to integrate with your favorite tools and systems.
Optionally integrate Google Calendar to schedule time for your users to update software when it’s convenient for them.
The right software at the right moment
Use self-service to keep employees productive and secure with software curated to their needs.
Install organization-approved software for macOS, Windows, and Linux.
Quickly deliver software for teams of any size, tailored to small groups or the entire organization.
Fleet lets us be more actionable with fewer people. It helps us to filter out the noise better than we could with the other big name products we replaced.
Andre Shields
Cybersecurity Security Engineer, Vulnerability Management
Up-to-date data without scans
Traditional network vulnerability scans can clog your network and even haunt your printers with pages full of wingdings. Fleet does things differently.
Eliminate the risk of side effects from scanning the network.
Lightweight enough for the most brittle environments (OT, data centers, embedded/BTS, low-latency gaming servers).
Quickly pull data about important CVEs and zero days during an incident or audit.
Untangle your security stack
Use open data and APIs to connect your vulnerability solution with osquery, the agent you might already have deployed.
Normalize asset management data and software inventories from multiple tools and operating systems.
Help teams work on vulnerabilities that have actually been exploited (CISA KEVs) or have a high probability of being exploited (EPSS), or whatever is important in your environment.
Process CVEs across cloud and non-cloud assets in a single platform and see who's responsible for what.