Security Auditor

Security Auditor

Core Security (Fortra)
+
+

Related Products

  • AdRem NetCrunch
    148 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    189 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    469 Ratings
    Visit Website
  • Predict360
    18 Ratings
    Visit Website
  • SuperOps
    216 Ratings
    Visit Website
  • Source Defense
    7 Ratings
    Visit Website
  • HERE Enterprise Browser
    2 Ratings
    Visit Website
  • Hyperproof
    277 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    116 Ratings
    Visit Website
  • Addigy
    247 Ratings
    Visit Website

About

Simplified security policy management and file integrity monitoring software. Security Auditor centralizes security administration across your cloud, on premise, or hybrid environment. Our agentless technology allows you to quickly enforce security policy adherence and mitigate the risks of security misconfiguration, a leading cause of data breaches. Security Auditor automatically protects new systems as they come online and continuously monitors those systems, identifying any configuration settings that don’t match your requirements. You'll be notified of any policy exceptions and can make changes yourself from an easy-to-use, web-based console, which simplifies tasks and compliance reporting requirements. Or if you prefer more automation, you can run the FixIt function and let Security Auditor do the work for you. Security Auditor simplifies the identification and security configuration for your elastic cloud infrastructure.

About

Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises that need a simplified security policy management and file integrity monitoring software to centralize security administration

Audience

IT teams searching for an advanced data encryption solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Core Security (Fortra)
Founded: 1996
United States
www.coresecurity.com/products/security-auditor

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/products/data-encryption/

Alternatives

Alternatives

CylanceENDPOINT

CylanceENDPOINT

BlackBerry
Panda Full Encryption

Panda Full Encryption

WatchGuard Technologies
AdRem NetCrunch

AdRem NetCrunch

AdRem Software

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

A10 Defend DDoS Mitigator
AD Lab
Amazon S3
BeyondCorp Enterprise
Cyble
Datacard Secura
Entrust Identity Enterprise
Entrust Identity Essentials
Google Cloud Platform
IBM Cloud
Intellego XT
Microsoft Azure
Qualys WAS
Rackspace OpenStack
SIRP
SOCRadar Extended Threat Intelligence
Teamstack
Trellix Endpoint Security (HX)
Trellix Security Platform

Integrations

A10 Defend DDoS Mitigator
AD Lab
Amazon S3
BeyondCorp Enterprise
Cyble
Datacard Secura
Entrust Identity Enterprise
Entrust Identity Essentials
Google Cloud Platform
IBM Cloud
Intellego XT
Microsoft Azure
Qualys WAS
Rackspace OpenStack
SIRP
SOCRadar Extended Threat Intelligence
Teamstack
Trellix Endpoint Security (HX)
Trellix Security Platform
Claim Security Auditor and update features and information
Claim Security Auditor and update features and information
Claim Trellix Data Encryption and update features and information
Claim Trellix Data Encryption and update features and information