Security AuditorCore Security (Fortra)
|
Trellix Data EncryptionTrellix
|
|||||
Related Products
|
||||||
About
Simplified security policy management and file integrity monitoring software. Security Auditor centralizes security administration across your cloud, on premise, or hybrid environment. Our agentless technology allows you to quickly enforce security policy adherence and mitigate the risks of security misconfiguration, a leading cause of data breaches. Security Auditor automatically protects new systems as they come online and continuously monitors those systems, identifying any configuration settings that don’t match your requirements. You'll be notified of any policy exceptions and can make changes yourself from an easy-to-use, web-based console, which simplifies tasks and compliance reporting requirements. Or if you prefer more automation, you can run the FixIt function and let Security Auditor do the work for you. Security Auditor simplifies the identification and security configuration for your elastic cloud infrastructure.
|
About
Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports.
Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location.
Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Enterprises that need a simplified security policy management and file integrity monitoring software to centralize security administration
|
Audience
IT teams searching for an advanced data encryption solution
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCore Security (Fortra)
Founded: 1996
United States
www.coresecurity.com/products/security-auditor
|
Company InformationTrellix
Founded: 2022
United States
www.trellix.com/products/data-encryption/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Encryption Features
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
|
||||||
Integrations
A10 Defend DDoS Mitigator
AD Lab
Amazon S3
BeyondCorp Enterprise
Cyble
Datacard Secura
Entrust Identity Enterprise
Entrust Identity Essentials
Google Cloud Platform
IBM Cloud
|
Integrations
A10 Defend DDoS Mitigator
AD Lab
Amazon S3
BeyondCorp Enterprise
Cyble
Datacard Secura
Entrust Identity Enterprise
Entrust Identity Essentials
Google Cloud Platform
IBM Cloud
|
|||||
|
|
|