- Cost-effective security information and event management (SIEM) software
- Automates the entire process of managing terabytes of machine-generated logs
- Collects, analyzes, searches, reports, and archives from a central location
- Reports on user activity, regulatory compliance, historical trends, and more
- Mitigates internal threats and monitors file integrity
- Conducts log forensics analysis, monitors privileged users, and ensures compliance with regulatory bodies
Learn more »
|
- Agent-less log analytics and configuration management software for network security devices
- Collects, archives, and analyzes security device logs and generates forensic reports from a central console
- Provides end-point security monitoring and analysis, employee Internet monitoring, and bandwidth monitoring
- Supports change management, capacity planning, policy enforcement, security, and compliance audit reporting
- Works with open source and commercial network firewalls (Check Point, Cisco, Juniper, Fortinet, Snort, and more) and IDS/IPS
- Supports VPNs, proxies, and related security devices
Learn more »
|
- A secure vault for storing and managing shared, sensitive information such as passwords, documents, and digital identities
- Centralizes password storage and access to eliminate password fatigue and security lapses
- Automates frequent password changes in critical systems to improve IT productivity
- Provides approval workflows and real-time alerts on password access to establish preventive and detective security controls
Learn more »
|
- Flow-based network security management
- Monitor and secure enterprise networks and data centers from attacks in real-time
- Classify threats/attacks into Bad Src-Dst, DDoS, Scan/Probe, and Suspect Flows
- Detect anonymous/suspicious network traffic
- Conduct detailed forensic investigation
Learn more »
|
- Web-based, Active Directory tool to track all domain events, including user, group, computer, GPO, and OU changes
- Audits Windows file servers, failover clusters, NetApp for document changes to files and folders, audit access, shares, and permissions
- Monitors every user logon and logoff, including every successful and failed logon event across network workstations
- Tracks Windows member servers, FIM, printers, and USB changes with events summary; tracks application, policy, and system events
- Brings 150+ ready-to-use audit reports with instant email alerts to ensure security and meet IT Compliance requirements
Learn more »
|
- Web-based, change auditing and reporting solution for MS Exchange environments
- Tracks and monitors enterprise ActiveSync infrastructure and the inventory of related smart devices
- Reports on Outlook Web Access usage, mailbox traffic, and mailbox growth
- Supports customized reports that use data filters, automatic scheduling, and multi-format report generation
- Provides audit feature that enables investigation of unauthorized mailbox logons and other critical changes
Learn more »
|
- Web-based, Active Directory management tool with mobile management options via iPhone and Android apps
- Provides Single-console Active Directory and Exchange management
- Enables one-step user creation with Exchange, LCS/OCS, and Lync settings
- Supports template and CSV-based bulk user creation
- Includes 150+ out-of-the-box, actionable reports, including security, compliance (SOX/HIPAA), and distribution list reports
- Supports granular, role- and OU-based delegation of help desk activities
- Automates user life cycle management, AD cleanup, and other crucial tasks
Learn more »
|
- Web-based, self-service, password solution with Android and iPhone apps for managing passwords on the go
- Allows users to reset or change their passwords and unlock their accounts, without IT intervention
- Reminds users automatically about soon-to-expire passwords by email or SMS
- Allows users to update their profile details, like contact information, in Active Directory
- Automatically synchronizes passwords with Google Apps, Office 365, Salesforce, IBM AS400, and more
Learn more »
|
- Web-based solution for managing thousands of servers, desktops, and mobile devices from a central location
- Creates a single-point solution provide for desktop and mobile device management (MDM)
- Provides a holistic solution to manage all MDM activities
- Offers an affordable and easy-to-use solution that is within the reach of any organization
Learn more »
|
- Web-based, multi-vendor network change, configuration, and compliance management (NCCM) solution
- Provides NCCM services for switches, routers, firewalls, and other network devices
- Delivers an integrated solution for automating and controlling the entire life cycle of device configuration management
- Establishes a single, centralized GUI for managing configurations, controlling changes, ensuring compliance, and automating tasks
Learn more »
|
- Automated incremental backup of Active Directory objects
- Simple and granular restoration down to the attribute level
- Change tracking to undo changes
- Detailed version management of each attribute change
- Provision to roll back Active Directory to an earlier state
Learn more »
|
|