iSecurity Safe-Update

iSecurity Safe-Update

Raz-Lee Security
+
+

Related Products

  • DriveStrike
    24 Ratings
    Visit Website
  • NinjaOne
    4,660 Ratings
    Visit Website
  • Rippling
    19,366 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,936 Ratings
    Visit Website
  • Iru
    1,282 Ratings
    Visit Website
  • Addigy
    260 Ratings
    Visit Website
  • Josys
    245 Ratings
    Visit Website
  • 1Password
    16,707 Ratings
    Visit Website
  • Atera
    1,986 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

Senturo safeguards Apple, Chromebook, Windows, and Android devices against loss, theft, and unauthorized access with powerful location tracking, device monitoring, and advanced recovery tools, while enhancing mobile device and data security through robust remote security policies and actions such as remote lock to protect your fleet. IT Fleet location tracking Senturo’s intuitive global map view built on Google Maps lets you monitor your entire device fleet at a glance. Pinpoint the real-time location of any device or review its movement history over the past year, ensuring you stay informed and in control. Monitoring and incident detection Ensure your devices stay where they belong. With geofencing and IP whitelisting, you’ll receive instant email alerts if a device leaves your approved area or connects to an unauthorized network, keeping your assets secure. Multi-OS messaging Send critical updates or alerts to your entire fleet in seconds.

About

iSecurity Safe-Update protects IBM i business critical data against updates by unauthorized programs. Such programs are those who come from a library which is not used to store production programs, file editors, DFU and Start SQL (STRSQL). It ensures that updates are made by pre-confirmed programs or by programs that are not known as file editors. Government and industry regulations, including Sarbanes-Oxley (SOX), GDPR, PCI, and HIPAA, stipulate measures that companies must take to ensure proper data security and monitoring. ​They require that only specifically permitted programs can make updates to business-critical data in production environments. Safe-Update guards against unauthorized updates by dangerous programs – programs were not designed for the organization’s business rules and do not comply with them. If an unauthorized update is attempted, a window appears requesting the entry of a ticket.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Field Services, Healthcare, Professional services, Schools, Universities

Audience

Companies searching for a platform that protects IBM i business critical data against updates by unauthorized programs

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$25 per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Senturo
Founded: 2021
United Kingdom
senturo.com

Company Information

Raz-Lee Security
Founded: 1983
United States
www.razlee.com/safe-update/

Alternatives

Alternatives

iSecurity AP-Journal

iSecurity AP-Journal

Raz-Lee Security
NetSfere

NetSfere

Infinite Convergence
iSecurity Field Encryption

iSecurity Field Encryption

Raz-Lee Security
Hexnode UEM

Hexnode UEM

Mitsogo Inc
iTransact

iTransact

Payroc

Categories

Categories

Asset Tracking Features

Activity Tracking
Audit Trails
Barcoding / RFID
Checkout / Check-In
Depreciation Tracking
Disposal Tracking
Inventory Management
Location Tracking
QR Codes
Reservations
Service History

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Asset Management Features

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
Inventory Management
IT Service Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Mobile Device Management (MDM) Features

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

Google
Jamf Pro
Meraki Systems Manager
Microsoft Intune

Integrations

Google
Jamf Pro
Meraki Systems Manager
Microsoft Intune
Claim Senturo and update features and information
Claim Senturo and update features and information
Claim iSecurity Safe-Update and update features and information
Claim iSecurity Safe-Update and update features and information