iSecurity Safe-UpdateRaz-Lee Security
|
||||||
Related Products
|
||||||
About
Senturo safeguards Apple, Chromebook, Windows, and Android devices against loss, theft, and unauthorized access with powerful location tracking, device monitoring, and advanced recovery tools, while enhancing mobile device and data security through robust remote security policies and actions such as remote lock to protect your fleet.
IT Fleet location tracking
Senturo’s intuitive global map view built on Google Maps lets you monitor your entire device fleet at a glance. Pinpoint the real-time location of any device or review its movement history over the past year, ensuring you stay informed and in control.
Monitoring and incident detection
Ensure your devices stay where they belong. With geofencing and IP whitelisting, you’ll receive instant email alerts if a device leaves your approved area or connects to an unauthorized network, keeping your assets secure.
Multi-OS messaging
Send critical updates or alerts to your entire fleet in seconds.
|
About
iSecurity Safe-Update protects IBM i business critical data against updates by unauthorized programs. Such programs are those who come from a library which is not used to store production programs, file editors, DFU and Start SQL (STRSQL). It ensures that updates are made by pre-confirmed programs or by programs that are not known as file editors. Government and industry regulations, including Sarbanes-Oxley (SOX), GDPR, PCI, and HIPAA, stipulate measures that companies must take to ensure proper data security and monitoring. They require that only specifically permitted programs can make updates to business-critical data in production environments. Safe-Update guards against unauthorized updates by dangerous programs – programs were not designed for the organization’s business rules and do not comply with them. If an unauthorized update is attempted, a window appears requesting the entry of a ticket.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Field Services, Healthcare, Professional services, Schools, Universities
|
Audience
Companies searching for a platform that protects IBM i business critical data against updates by unauthorized programs
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$25 per month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationSenturo
Founded: 2021
United Kingdom
senturo.com
|
Company InformationRaz-Lee Security
Founded: 1983
United States
www.razlee.com/safe-update/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Asset Tracking Features
Activity Tracking
Audit Trails
Barcoding / RFID
Checkout / Check-In
Depreciation Tracking
Disposal Tracking
Inventory Management
Location Tracking
QR Codes
Reservations
Service History
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
IT Asset Management Features
Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
Inventory Management
IT Service Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management
Mobile Device Management (MDM) Features
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
|
||||||
Integrations
Google
Jamf Pro
Meraki Systems Manager
Microsoft Intune
|
||||||
|
|