IT Security Management

Solutions for managing IT security and compliance

EventLog Analyzer

IT Compliance and Log Management

EventLog Analyzer

  • Cost-effective security information and event management (SIEM) software
  • Automates the entire process of managing terabytes of machine-generated logs
  • Collects, analyzes, searches, reports, and archives from a central location
  • Reports on user activity, regulatory compliance, historical trends, and more
  • Mitigates internal threats and monitors file integrity
  • Conducts log forensics analysis, monitors privileged users, and ensures compliance with regulatory bodies
Firewall Analyzer

Firewall Security and Configuration Management

Firewall Analyzer

  • Agent-less log analytics and configuration management software for network security devices
  • Collects, archives, and analyzes security device logs and generates forensic reports from a central console
  • Provides end-point security monitoring and analysis, employee Internet monitoring, and bandwidth monitoring
  • Supports change management, capacity planning, policy enforcement, security, and compliance audit reporting
  • Works with open source and commercial network firewalls (Check Point, Cisco, Juniper, Fortinet, Snort, and more) and IDS/IPS
  • Supports VPNs, proxies, and related security devices
Password Manager Pro

Privileged Password Management

Password Manager Pro

  • A secure vault for storing and managing shared, sensitive information such as passwords, documents, and digital identities
  • Centralizes password storage and access to eliminate password fatigue and security lapses
  • Automates frequent password changes in critical systems to improve IT productivity
  • Provides approval workflows and real-time alerts on password access to establish preventive and detective security controls
Key Manager Plus

SSH Key and SSL Certificate Management

Key Manager Plus

  • Discover SSH systems in the network, enumerate users, and private keys.
  • Consolidate all discovered SSH keys in a secure, centralized repository.
  • Create and deploy new key pairs on target systems, and rotate them periodically.
  • Launch direct SSH connections with target systems; audit and track all user activities.
  • Discover and consolidate all SSL certificates in a centralized repository and receive alerts when they're about to expire.
  • Centralize certificate and CSR creation process; identify and eliminate weak SHA-1 certificates.
ADAudit Plus

Active Directory Change Auditing and Reporting

ADAudit Plus

  • Web-based, Active Directory tool to track all domain events, including user, group, computer, GPO, and OU changes
  • Audits Windows file servers, failover clusters, NetApp for document changes to files and folders, audit access, shares, and permissions
  • Monitors every user logon and logoff, including every successful and failed logon event across network workstations
  • Tracks Windows member servers, FIM, printers, and USB changes with events summary; tracks application, policy, and system events
  • Brings 150+ ready-to-use audit reports with instant email alerts to ensure security and meet IT Compliance requirements
Exchange Reporter Plus

Exchange Server Change Audit and Reporting

Exchange Reporter Plus

  • Web-based, change auditing and reporting solution for MS Exchange environments
  • Tracks and monitors enterprise ActiveSync infrastructure and the inventory of related smart devices
  • Reports on Outlook Web Access usage, mailbox traffic, and mailbox growth
  • Supports customized reports that use data filters, automatic scheduling, and multi-format report generation
  • Provides audit feature that enables investigation of unauthorized mailbox logons and other critical changes
ADManager Plus

Active Directory Management and Reporting

ADManager Plus

  • Web-based, Active Directory management tool with mobile management options via iPhone and Android apps
  • Provides Single-console Active Directory and Exchange management
  • Enables one-step user creation with Exchange, LCS/OCS, and Lync settings
  • Supports template and CSV-based bulk user creation
  • Includes 150+ out-of-the-box, actionable reports, including security, compliance (SOX/HIPAA), and distribution list reports
  • Supports granular, role- and OU-based delegation of help desk activities
  • Automates user life cycle management, AD cleanup, and other crucial tasks
ADSelfService Plus

Self-Service Password Management

ADSelfService Plus

  • Web-based, self-service, password solution with Android and iPhone apps for managing passwords on the go
  • Allows users to reset or change their passwords and unlock their accounts, without IT intervention
  • Reminds users automatically about soon-to-expire passwords by email or SMS
  • Allows users to update their profile details, like contact information, in Active Directory
  • Automatically synchronizes passwords with Google Apps, Office 365, Salesforce, IBM AS400, and more
Desktop Central

Integrated Desktop and Mobile Device Management

Desktop Central

  • Web-based solution for managing thousands of servers, desktops, and mobile devices from a central location
  • Creates a single-point solution provide for desktop and mobile device management (MDM)
  • Provides a holistic solution to manage all MDM activities
  • Offers an affordable and easy-to-use solution that is within the reach of any organization

Network Configuration Management

Network Configuration Manager

  • Web-based, multi-vendor network change, configuration, and compliance management (NCCM) solution
  • Provides NCCM services for switches, routers, firewalls, and other network devices
  • Delivers an integrated solution for automating and controlling the entire life cycle of device configuration management
  • Establishes a single, centralized GUI for managing configurations, controlling changes, ensuring compliance, and automating tasks

Customer Stories

  • "I don't need to be in the application to know if something is happening that needs attention. I get reports and alerts through emails. No surprises when I walk into the office. That is peace of mind."

    - Jim Lloyd, Information System manager

  • "We selected Firewall Analyzer because it was easier to setup than all other products we evaluated, it had the best management and graphical user interface, and provided us detailed firewall reports to meet FINRA, SEC, and SOX IT audit requirements"

    - Bob Fuller, Director of IT