Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Manages user network accessibility on laptops and mobile devices.
(Based on 9 reviews)
Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.
Blocks endpoint users from accessing restricted applications.
Delegate backup settings to facilitate specific recovery in the result of a disaster.
(Based on 19 reviews)
Provide remote access dashboards designed to manage and store data from familiar applications.
The ability to store multiple types of file formats or convert files to proper format.
The abillity to automate backups or have backup storage updated continuously.
The ability to restore files to its original location or alternative sources on-demand.
(Based on 16 reviews)
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Protects endpoint devices from a variety of attacks and malware threats.
Provides multiple techniques and information sources to alert users of malware occurrences.
Actively monitor status of work stations either on-premise or remote.
Reporting abilities to assess data quality and activity.
Send summary, update, or actionable alerts to administrators to detail activity.
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
The product has a recurring examination process to update your intelligence reports as new threats emerge.
Monitors assets and enforces security policies to audit assets and infrastructure security.
(Based on 6 reviews)
Provide some level of encryption of data in transit, protecting sensitive data while it lives in the backup application.
Security and Compliance
Abilities to set standards for asset and risk management.
Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.