+
+

Related Products

  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    208 Ratings
    Visit Website
  • ManageEngine OpManager
    1,660 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website
  • Site24x7
    1,160 Ratings
    Visit Website
  • Auvik
    668 Ratings
    Visit Website
  • ManageEngine Log360
    163 Ratings
    Visit Website

About

In cybersecurity, speed is critical, and Intrusion helps you understand your environment’s biggest threats, fast. See the real-time list of all blocked connections, drill down on an individual connection to see more details like why it was blocked, risk level, etc. An interactive map shows you what countries your business is communicating with the most. Quickly see which devices have the most malicious connection attempts to prioritize remediation efforts. If an IP is trying to connect, you’ll see it. Intrusion monitors traffic bidirectionally in real time, giving you full visibility of every connection being made on your network. Stop guessing which connections are actual threats. Informed by decades of historical IP records and reputation in the global threat engine, it instantly identifies malicious or unknown connections in your network. Reduce cyber security team burnout and alert fatigue with autonomous real-time network monitoring and 24/7 protection.

About

The value of SafeConnect NAC is simply this— by ensuring that every connected device is visible, checked for compliance in real-time, and respectively blocked or allowed in real-time, security incidents can be reduced substantially. Don’t risk your organization’s data and reputation by exposing it – instead ensure that the security of your network, your constituents’ personal information, and your intellectual property remains intact. Many organizations are faced with the ever-increasing onslaught of unknown devices accessing their critical infrastructure. Employees, customers, contractors, guests, suppliers and their devices are all potential threat vectors representing a challenge to implement network security policies without inhibiting business productivity. There is also the daunting task of providing user and device access/blocked access information to meet regulatory compliance and for security forensics.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises looking for a solution for protecting their companies from digital threats

Audience

IT Professionals and Network Professionals seeking a solution to manage all their operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Intrusion
United States
www.intrusion.com/products/on-premise-network-protection/

Company Information

OPSWAT
Founded: 2002
United States
www.opswat.com/products/metaaccess/nac

Alternatives

Alternatives

Genian NAC

Genian NAC

GENIANS
ExtraHop RevealX

ExtraHop RevealX

ExtraHop Networks
Forescout

Forescout

Forescout Technologies
FortiNAC

FortiNAC

Fortinet
GREYCORTEX Mendel

GREYCORTEX Mendel

GREYCORTEX
TruNAC

TruNAC

Wise-Mon

Categories

Categories

Network Access Control (NAC) Features

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Integrations

A10 Defend DDoS Mitigator
OPSWAT MetaDefender

Integrations

A10 Defend DDoS Mitigator
OPSWAT MetaDefender
Claim Intrusion and update features and information
Claim Intrusion and update features and information
Claim SafeConnect NAC and update features and information
Claim SafeConnect NAC and update features and information