Alternatives to Qualys File Inventory Monitoring (FIM)

Compare Qualys File Inventory Monitoring (FIM) alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Qualys File Inventory Monitoring (FIM) in 2024. Compare features, ratings, user reviews, pricing, and more from Qualys File Inventory Monitoring (FIM) competitors and alternatives in order to make an informed decision for your business.

  • 1
    Paessler PRTG

    Paessler PRTG

    Paessler GmbH

    Paessler PRTG is an all-inclusive monitoring software solution developed by Paessler. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine, PRTG optimizes connections and workloads as well as reduces operational costs by avoiding outages while saving time and controlling service level agreements (SLAs). The solution is packed with specialized monitoring features that include flexible alerting, cluster failover solution, distributed monitoring, in-depth reporting, maps and dashboards, and more. PRTG monitors your entire IT infrastructure. All important technologies are supported: • SNMP: ready-to-use and custom options • WMI and Windows Performance Counters • SSH: for Linux/Unix and macOS systems • Traffic analysis using flow protocols or packet sniffing • HTTP requests • REST APIs returning XML or JSON • Ping, SQL, and many more
    Leader badge
    Compare vs. Qualys File Inventory Monitoring (FIM) View Software
    Visit Website
  • 2
    ManageEngine EventLog Analyzer
    ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports. EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
    Compare vs. Qualys File Inventory Monitoring (FIM) View Software
    Visit Website
  • 3
    ManageEngine ADAudit Plus
    ADAudit Plus helps keep your Windows Server ecosystem secure and compliant by providing full visibility into all activities. ADAudit Plus provides a clear picture of all changes made to your AD resources including AD objects and their attributes, group policy, and more. AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. Audit user management actions including creation, deletion, password resets, and permission changes, along with details on who did what, when, and from where. Keep track of when users are added or removed from security and distribution groups to ensure that users have the bare minimum privileges.
    Compare vs. Qualys File Inventory Monitoring (FIM) View Software
    Visit Website
  • 4
    ManageEngine Log360
    Log360 is a one-stop solution for all your log management and network security challenges. This tightly-integrated solution combines the capabilities of ADAudit Plus, EventLog Analyzer, O365 Manager Plus, Exchange Reporter Plus, and Cloud Security Plus. With a versatile combination like this, you'll gain complete control over your network; you'll be able to audit Active Directory changes, network device logs, Microsoft Exchange Servers, Microsoft Exchange Online, Azure Active Directory, and your public cloud infrastructure all from a single console. Monitor and audit critical Active Directory changes in real time. Meet stringent requirements of regulatory mandates such as PCI DSS, FISMA, HIPAA, SOX, GLBA, GPG 13, and the GDPR by means of readily available reports. Receive exhaustive information in the form of audit reports on critical events in Azure Active Directory and Exchange Online.
    Compare vs. Qualys File Inventory Monitoring (FIM) View Software
    Visit Website
  • 5
    Runecast

    Runecast

    Runecast Solutions

    Runecast is an enterprise CNAPP platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It automates vulnerability assessment, configuration drift management and continuous compliance – for VMware, Cloud and Containers. By proactively using our agentless scanning in real-time admins discover potential risks and remediation solutions before any issues can develop into a major outage. It provides continuous audits against vendor best practices, common security standards, and frameworks such as BSI IT-Grundschutz, CIS, Cyber Essentials, DISA STIG, DORA, Essential 8, GDPR, HIPAA, ISO 27001, KVKK, NIST, PCI DSS, TISAX, VMware Security Hardening Guidelines, and the CISA KEVs catalog. Detect and assess risks and be fully compliant across your hybrid cloud in minutes. Runecast has been recognized with Frost & Sullivan's 2023 European New Product Innovation Award in the CNAPP industry.
  • 6
    CimTrak Integrity Suite
    Securing your enterprise against internal and external threats is key to meeting compliance standards and regulations. CimTrak’s change management, auditing, and reporting capabilities allow private and public companies to meet or exceed even the most rigorous compliance mandates. From PCI, SOX, HIPAA, CIS, NIST, and many more, CimTrak has you covered. File and System Integrity monitoring helps protect your critical files from changes, whether malicious or accidental, that can take down your critical IT infrastructure, threaten critical data, or cause non-compliance with regulations such as PCI. Change is inevitable in the IT environment. CimTrak delivers integrity monitoring, proactive incident response, change control, and auditing capabilities in one easy to use and cost-effective file integrity monitoring tool.
  • 7
    Datadog

    Datadog

    Datadog

    Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.
  • 8
    Coralogix

    Coralogix

    Coralogix

    Coralogix is the leading stateful streaming platform providing modern engineering teams with real-time insights and long-term trend analysis with no reliance on storage or indexing. Ingest data from any source for a centralized platform to manage, monitor, and alert on your applications. As data is ingested, Coralogix instantly narrows millions of events down to common patterns for deeper insights and faster troubleshooting. Machine learning algorithms continuously observe data patterns and flows between system components and trigger dynamic alerts so you know when a pattern deviates from the norm without static thresholds or the need for pre-configurations. Connect any data, in any format, and view your insights anywhere including our purpose-built UI, Kibana, Grafana, SQL clients, Tableau, or using our CLI and full API support. Coralogix has successfully completed relevant security and privacy compliances by BDO including GDPR, SOC 2, PCI, HIPAA, and ISO 27001/27701.
  • 9
    Symantec Data Center Security
    Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments. Security hardening and monitoring for private cloud and physical data centers with support for Docker containers. Agentless Docker container protection with full application control and integrated management. Block zero-day exploits with application whitelisting, granular intrusion prevention, and real-time file integrity monitoring (RT-FIM). Secure OpenStack deployments with full hardening of Keystone identity service module. Data center security: monitoring. Continuous security monitoring of private cloud and physical on-premises data center environments. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services.
  • 10
    Atomicorp Enterprise OSSEC
    Atomic Enterprise OSSEC is the commercially enhanced version of the OSSEC Intrusion Detection System brought to you by the sponsors of the OSSEC project. OSSEC is the world’s most popular open source host-based intrusion detection system (HIDS) used by tens of thousands of organizations. Atomicorp extends OSSEC with a management console (OSSEC GUI), advanced file integrity management (FIM), PCI compliance auditing and reporting, expert support and more. - Intrusion Detection - File Integrity Monitoring - Log Management - Active Response - OSSEC GUI and Management - OSSEC Compliance Reporting - PCI, GDPR, HIPAA, and NIST compliance - Expert OSSEC Support Get expert support for OSSEC servers and agents as well as help developing OSSEC rules. More info on Atomic Enterprise OSSEC is available at: https://www.atomicorp.com/atomic-enterprise-ossec/
  • 11
    Netwrix Change Tracker
    Netwrix Change Tracker provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Netwrix Change Tracker will ensure that your IT systems remain in a known, secure and compliant state at all times. Netwrix Change Tracker includes context-based File Integrity Monitoring and File Whitelisting to assure all change activity is automatically analyzed and validated. Complete and certified CIS and DISA STIG configuration hardening ensures all systems remain securely configured at all times and, coupled with the most intelligent change control technology, provides unparalleled change noise reduction along with the ultimate reassurance that the changes occurring within your production environment are consistent, safe and as required.
  • 12
    FileVantage

    FileVantage

    CrowdStrike

    Gain central visibility into all critical file changes with relevant, intuitive dashboards displaying valuable information on what changes, who changed it, and how the files and folders were changed. FileVantage provides IT staff additional context with added threat intelligence and detection data. Staff can quickly target file change data with any relevant adversary activity. Oversee all file changes with summary and detailed view dashboards - reduce alert fatigue by quickly targeting changes to critical files and systems. See unauthorized modifications to all relevant critical system, configuration and content files. Use pre-defined and custom policies to gain added efficiency and reduce alert volume. Create new policies based on all critical files, folders and registries, as well as users and processes.
  • 13
    OSSEC

    OSSEC

    OSSEC

    OSSEC is fully open source and free, you can tailor OSSEC for your security needs through its extensive configuration options, adding custom alert rules and writing scripts to take action when alerts occur. Atomic OSSEC helps organizations meet specific compliance requirements such as NIST and PCI DSS. It detects and alerts on unauthorized file system modification and malicious behavior that could make you non-compliant. The Atomic OSSEC open source-based detection and response system adds thousands of enhanced OSSEC rules, real-time FIM, frequent updates and software integrations, built-in active response, a graphical user interface (GUI), compliance tools, and expert professional support. It’s a versatile XDR and compliance all-in-one security solution.
  • 14
    Assuria ALM-FIM
    Monitor selected critical files, folders, and registry keys (especially those that should rarely change in normal operations) for any changes that could represent risk. Discover all of your installed packages and automatically monitor, report and alert on changes. Package monitoring is driven by policy templates allowing selective reporting and alerting of key changes. ALM FIM can store the old and new contents of changed text files and registry keys to identify and assess the exact changes that have occurred and reverse them if required. ALM-FIM collects and stores metadata about files, folders, and registry keys to provide monitoring services. Metadata collected includes details such as check-sum of the contents, size, permissions, change time, links, and other details.
  • 15
    Security Auditor

    Security Auditor

    Core Security (Fortra)

    Simplified security policy management and file integrity monitoring software. Security Auditor centralizes security administration across your cloud, on premise, or hybrid environment. Our agentless technology allows you to quickly enforce security policy adherence and mitigate the risks of security misconfiguration, a leading cause of data breaches. Security Auditor automatically protects new systems as they come online and continuously monitors those systems, identifying any configuration settings that don’t match your requirements. You'll be notified of any policy exceptions and can make changes yourself from an easy-to-use, web-based console, which simplifies tasks and compliance reporting requirements. Or if you prefer more automation, you can run the FixIt function and let Security Auditor do the work for you. Security Auditor simplifies the identification and security configuration for your elastic cloud infrastructure.
  • 16
    Fidelis Halo

    Fidelis Halo

    Fidelis Security

    Fidelis Halo is a unified, SaaS-based cloud security platform that automates cloud computing security controls and compliance across servers, containers, and IaaS in any public, private, hybrid, and multi-cloud environment. With over 20,000 pre-configured rules and more than 150 policy templates that cover standards such as PCI, CIS, HIPAA, SOC, and DISA STIGs for IaaS services, Halo’s extensive automation capabilities streamline and accelerate workflows between InfoSec and DevOps. The comprehensive, bi-directional Halo API, developer SDK, and toolkit automate your security and compliance controls into your DevOps toolchain to identify critical vulnerabilities so they can be remediated prior to production. The free edition of Halo Cloud Secure includes full access to the Halo Cloud Secure CSPM service for up to 10 cloud service accounts across any mix of AWS, Azure, and GCP, at no cost to you, ever. Sign up now and start your journey to fully automated cloud security!
  • 17
    Chainkit

    Chainkit

    Chainkit

    Go beyond static File Integrity Monitoring (FIM). Automate integrity in motion and at rest—in real-time. With eXtended Integrity Monitoring (XIM) from Chainkit. Chainkit detects threats faster and in real-time, which in turn reduces the amount of time that undetected attacks linger in your data. Chainkit dramatically increases the visibility of attacks within your data. It detects anti-forensic tampering techniques that attackers use to evade detection. Chainkit seeks out malware hidden within your data and provides full transparency on tampered logs. Chainkit preserves the integrity of artifacts required by forensic investigators. Chainkit enhances attestation for ISO, NIST and related log or audit trail compliance requirements. Chainkit can help you reach and maintain compliance for all security compliance regulations. We provide customers with a more comprehensive audit-readiness posture.
  • 18
    VMware Carbon Black App Control
    Lock down critical systems and servers to prevent unwanted changes and ensure continuous compliance with regulatory mandates. Harden new and legacy systems against unwanted change, simplify the compliance process, and provide protection for corporate systems. VMware Carbon Black® App Control™ is one of the most proven and scalable application control solutions on the market. Consolidate multiple endpoint security capabilities, and operate faster and more effectively with a single, cloud native platform. Stop malware, ransomware, zero-day and non-malware attacks. Prevent unauthorized change with file-integrity monitoring, device control and memory protection. Monitor critical activity to assess risk and maintain system integrity. Secure EOL systems with powerful change-control and application control policies. Out-of-the-box templates keep management overhead low.
  • 19
    Powertech Database Monitor for IBM i
    With real-time visibility into every change users make across all systems, security administrators can virtually eliminate the risk of undetected data corruption. See what users are changing across systems. By combining data from multiple, connected systems, you have a centralized view for reporting and archiving, making database security management easier. Maintain an audit trail of all system changes made in a secure database that helps you meet the requirements of some of the most stringent security regulations. Use filters to monitor and record changes to only your sensitive data. Define which fields contain data to be monitored and set the criteria for triggering a notification. Both powerful and easy-to-use, Powertech Database Monitor for IBM i automatically monitors user activity in real time on your IBM i databases. The ability to process events by exception helps you reduce manual database security and file integrity monitoring in order to streamline workflows.
  • 20
    Samhain

    Samhain

    Samhain Design Labs

    Samhain is an open-source, host-based intrusion detection system (HIDS) that provides file integrity checking and log file monitoring/analysis, as well as port monitoring, detection of rogue SUID executables, and hidden processes. Samhain been designed to monitor multiple hosts with potentially different operating systems, providing centralized logging and maintenance, although it can also be used as a standalone application on a single host. Beltane is a web-based central management console for the Samhain file integrity/intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases.
  • 21
    TrueFort

    TrueFort

    TrueFort

    Attackers will always find a way in. Insulate your environment against spreading compromise by enforcing a positive security model that curbs lateral movement. TrueFort gives security teams the scalable workload protection platform they need to secure hybrid environments. Next-gen firewalls and IP address-based controls are completely ineffective in modern infrastructure. Whether your workloads execute in the cloud, in virtual infrastructure, or on physical servers, TrueFort protects against advanced attacks with workload hardening, integrity monitoring, detection and response, and identity-based segmentation. Only TrueFort combines environment-wide security observability with real-time response, service account behavior analytics, file integrity monitoring, and CIS-certified hardening and file integrity monitoring that highlights differences between file and binary versions.
  • 22
    Rapid7 InsightIDR
    With the cloud architecture and intuitive interface in InsightIDR, it's easy to centralize and analyze your data across logs, network, endpoints, and more to find results in hours—not months. User and Attacker Behavior Analytics, along with insights from our threat intel network, is automatically applied against all of your data, helping you detect and respond to attacks early. In 2017, 80% of hacking-related breaches used either stolen passwords and/or weak or guessable passwords. Users are both your greatest asset and your greatest risk. InsightIDR uses machine learning to baseline your users' behavior, automatically alerting you on the use of stolen credentials or anomalous lateral movement.
  • 23
    Microsoft Defender for Cloud
    Microsoft Defender for Cloud is a solution for cloud security posture management (CSPM) and cloud workload protection (CWP) that finds weak spots across your cloud configuration, helps strengthen the overall security posture of your environment, and can protect workloads across multicloud and hybrid environments from evolving threats. Get a continuous assessment of the security of your cloud resources running in Azure, AWS, and Google Cloud. Use built-in policies and prioritized recommendations that are aligned to key industry and regulatory standards or build custom requirements that meet your organization's needs. Use actionable insights to automate recommendations and help ensure that resources are configured securely and meet your compliance needs. Microsoft Defender for Cloud enables you to protect against evolving threats across multicloud and hybrid environments.
    Starting Price: $0.02 per server per hour
  • 24
    SolarWinds Security Event Manager
    Improve your security posture and quickly demonstrate compliance with a lightweight, ready-to-use, and affordable security information and event management solution. Security Event Manager (SEM) will be another pair of eyes watching 24/7 for suspicious activity and responding in real time to reduce its impact. Virtual appliance deployment, intuitive UI, and out-of-the-box content means you can start getting valuable data from your logs with minimal expertise and time. Minimize the time it takes to prepare and demonstrate compliance with audit proven reports and tools for HIPAA, PCI DSS, SOX, and more. Our licensing is based on the number of log-emitting sources, not log volume, so you won’t need to be selective about the logs you gather to keep costs down.
  • 25
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
  • 26
    Panzura

    Panzura

    Panzura

    The explosion of unstructured data has turned your work environment into an unmanageable and expensive data swamp where you can’t find, trust, or easily use the files you need. Panzura changes that by transforming all your storage into the most secure, and easy-to-use cloud data management platform on the planet. – Enable immediate, efficient performance and global data consistency, at scale. – Unlock secure, data access from edge to core to cloud without any performance penalty. – Empower a truly collaborative working experience, anywhere. – Gain true multi-cloud redundancy and data protection with cloud mirroring. Innovation can seem impossible when you’re drowning in data. Panzura simplifies and consolidates your data management, improving access and visibility, empowering collaboration, and letting you drive better outcomes, in less time.
  • 27
    Trustwave

    Trustwave

    Trustwave

    Cloud-native platform that gives enterprises unprecedented visibility and control over how security resources are provisioned, monitored and managed across any environment. The Trustwave Fusion platform is a cloud-based cybersecurity platform that serves as the foundation for the Trustwave managed security services, products and other cybersecurity offerings. The Trustwave Fusion platform is purpose built to meet the enterprise where they are today in their operations and in the future as they embrace digital transformation and contend with a continuously evolving security landscape. Connects the digital footprints of enterprises and government agencies to a robust security cloud comprised of the Trustwave data lake, advanced analytics, actionable threat intelligence, a wide range of security services and products and Trustwave SpiderLabs, the company’s elite team of security specialists.
  • 28
    Tripwire

    Tripwire

    Fortra

    Cybersecurity for Enterprise and Industrial Organizations. Protect against cyberattacks with the industry’s best foundational security controls. Detect threats, identify vulnerabilities and harden configurations in real time with Tripwire. Thousands of organizations trust Tripwire Enterprise to serve as the core of their cybersecurity programs. Join them and regain complete control over your IT environment with sophisticated FIM and SCM. Shortens the time it takes to catch and limit damage from threats, anomalies, and suspicious changes. Gives you deep, unparalleled visibility into your security system state and know your security posture at all times. Closes the gap between IT and security by integrating with both teams' existing toolsets. Out-of-the-box platforms and policies enforce regulatory compliance standards.
  • 29
    AlienVault USM

    AlienVault USM

    AT&T Cybersecurity

    Hundreds of MSSPs worldwide use AlienVault® Unified Security Management® (USM) to build successful managed security and compliance service offerings. AlienVault USM is the only solution to deliver multiple essential security capabilities plus continuously updated threat intelligence—all in one affordable platform. With it, MSSPs can simplify and centralize threat detection, incident response, and compliance management across their customers’ cloud and on-premises environments. Built to meet the challenges of today’s dynamic MSSP market, AlienVault USM is highly scalable, cost-effective, and easy to deploy and manage. It enables MSSPs to rapidly grow their managed security services offerings to meet their customers’ security goals while minimizing their own risk and expense.
  • 30
    CrowdStrike Falcon
    The Falcon Platform is flexible and extensible when it comes to meeting your endpoint security needs. You can purchase the bundles above or any of the modules listed below. The additional modules can be added to Falcon Endpoint Protection bundles. Stand-alone modules can be purchased by anyone and do not require a Falcon Endpoint Protection bundle. Our specialized products are for customers working with more stringent compliance or operational requirements. Purpose-built in the cloud to eliminate complexity and simplify deployment across an organization’s entire estate of endpoints. Lightweight Falcon agent running on each endpoint includes all the prevention technologies required to protect the endpoint, whether it is online or offline. Cloud-native platform operates without constant signature updates, complex integrations or on-premises equipment. Minimal CPU overhead does not impact system performance and end-user productivity.
  • 31
    CompliancePoint OnePoint
    CompliancePoint's OnePoint™ technology solution helps organizations practically and powerfully operationalize critical privacy, security and compliance activities within one simple interface. Use OnePoint™ to improve visibility and manage risk while reducing the cost, time and effort required to prepare for audits. Today, most organizations are required to follow at least one, but more often many, regulations. In addition to legal requirements, many organizations also juggle responsibilities related to industry standards or best practices. This can be daunting and time consuming. OnePoint™ enables organizations to implement a unified approach to complying with numerous standards and programs such as HIPAA, PCI, SSAE 16, FISMA, NIST, ISO, cyber security framework, GDPR, and more. Do you struggle to achieve critical privacy, security and compliance tasks on an ongoing basis? OnePoint™ provides organizations with the right tools and support that go beyond a "point in time" evaluation.
  • 32
    UVexplorer

    UVexplorer

    UV Networks

    UVexplorer PRO automatically and quickly discovers all of the information about the devices on your network and the connections between them. UVexplorer creates network maps for documentation, meetings, presentations, sharing with your boss, or hanging on the wall. Export UVexplorer's automated network maps to PRTG, LucidChart, Microsoft Visio™, PDF, and SVG file types. UVexplorer also backups and provides change notifications for configurations of your network devices, such as routers, switches, and firewalls. Track how device configurations change over time. With UVexplorer's PRTG Connector, add powerful network discovery, detailed device inventory, and automatic network maps to PRTG Network Monitor. Capture detailed device and network inventory information to help meet documentation requirements of governmental regulations like PCI, HIPAA, FISMA, SOX, etc. Analyze and solve network and device problems with UVexplorer's suite of diagnostic tools.
  • 33
    ControlCase

    ControlCase

    ControlCase

    Almost every business has to comply with multiple information security related standards and regulations. IT compliance audits are complicated, expensive, and full of challenges. These can include but are not limited to PCI DSS, ISO 27001, GDPR, HIPAA, HITRUST, FISMA, NIST 800-53, MARS-E, BITS FISAP. Managing these audits individually poses a number of challenges for a business; including repetition of efforts, managing multiple audit firms, increased costs, complexity and time. While standards such as PCI DSS, ISO and SOC provide a benchmark for protecting data, criminals are always on the hunt for security vulnerabilities and malware to exploit organizations. The ControlCase Data Security Rating is focused exclusively on understanding your environment and providing solutions that seamlessly integrate security and go beyond just compliance.
  • 34
    CloudRadar Monitoring
    CloudRadar is a professional monitoring solution. It monitors public and private servers, networks and network devices, clouds and websites in one application for availability, uptime, process and performance metrics. CloudRadar promises fast deployment with guided configuration and best-practice alert types pre-configured in its complete alerting engine. Outages and issues are immediately alerted with CloudRadar's notification feature, using 7 different channels to choose from to deliver alerts. Users can completely customize alert thresholds or set up unlimited new checks per host with a complete team management capability. With a focus on delivering a radically simple, uncluttered interface encompassing all critical monitoring metrics, CloudRadar is tool that is built for System Admins and IT managers - allowing them to monitor their entire infrastructure in one unified, easy-to-use interface with deep insights into office, remote or cloud resources across the stack.
  • 35
    Restorepoint

    Restorepoint

    ScienceLogic

    Restorepoint enables organizations to increase availability, security and compliance by automating critical tasks across their multi-vendor infrastructures Restorepoint automates network configuration backup, recovery, compliance analysis, and change management for more than 100 network and security vendors. Save hours of network administration, auditing time, and reduce risk by using a single solution for multi-vendor management. Meet internal, best practice or external network security standards such as PCI, GDPR, ITIL, ISO27001, NIST, SOX and HIPAA. Automate network change processes, make complex network configuration changes in seconds, and see the results. Automatically discover manage and track your network assets. Forget about maintaining network asset management spreadsheets. Save hours of administration per week, backup network configurations without complex scripts or manual process.
  • 36
    Ignyte Assurance Platform

    Ignyte Assurance Platform

    Ignyte Assurance Platform

    Ignyte Assurance Platform is an AI-enabled integrated risk management platform that helps organizations from different industries implement simplified, measurable, and repeatable GRC processes. One of the main objectives of this platform is to ensure that users are able to easily keep up and comply with changing regulations, standards, and guidelines related to cybersecurity. Ignyte Assurance Platform provides users with automated ways of continuously monitoring and assessing how their organization is adhering to the requirements specified under GDPR, HIPAA, PCI-DSS, FedRAMP, FFIEC, FISMA, and PCI-DSS. Security frameworks and regulations are automatically mapped to the internal controls and policies they are implementing. The compliance management platform also offers audit management capabilities that make it easy for users to gather and organize the pieces of information and evidence needed by external auditors.
  • 37
    Accellion

    Accellion

    Accellion

    The Accellion secure content communication platform prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, compliance and control over the communication of IP, PII, PHI, and other sensitive content across all third-party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. When users click the Accellion button, they know it’s the safe, secure way to share sensitive information with the outside world. With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others. Accellion solutions have protected more than 25 million end users at more than 3,000 companies.
  • 38
    Quest Enterprise Reporter
    Security and system administrators have a broad range of responsibilities, including achieving and maintaining IT security and compliance across their Microsoft environments. But, as organizations grow both on-premises and expand into the cloud, they often lack visibility into users, groups, permissions, applications and more which can result in compromised security and potential data loss. Knowing who can access what information in your Microsoft environment is imperative for keeping your data and users secure. With Enterprise Reporter, you can gain visibility into your critical Microsoft configurations — from Active Directory and Exchange to teams and OneDrive for Business. Our comprehensive reporting solution enhances compliance with security best practices and internal policies while helping you ensure compliance with external regulatory mandates, including HIPAA, GDPR, PCI, SOX, FISMA, and more.
  • 39
    CYRISMA

    CYRISMA

    CYRISMA

    CYRISMA is an all-in-one cyber risk management platform that enables you to discover, understand, mitigate, and manage risk in a holistic and cost-effective manner. Identify and mitigate network and endpoint vulnerabilities, discover and secure sensitive data across cloud and on-prem environments, strengthen OS configuration settings, track compliance, and generate cyber risk assessment reports in a few easy steps. Platform capabilities include (everything included in the price): -- Vulnerability and Patch Management -- Secure OS Configuration Scanning -- Sensitive data discovery; data protection (both on-prem cloud including Microsoft Office 365 and Google Workspace) -- Dark web monitoring -- Compliance Tracking (NIST CSF, CIS Critical Controls, SOC 2, PCI DSS, HIPAA, ACSC Essential Eight, NCSC Cyber Essentials) -- Active Directory Monitoring (both on-prem and Azure) -- Cyber risk quantification in multiple currencies -- Cyber risk assessment and reporting
  • 40
    ARCON | UBA
    The ARCON | UBA self-learning solution builds baseline behavioral profiles for your end users and triggers real-time alerts if it detects anomalous behavior, reducing insider threats exponentially. The ARCON | UBA tool creates a ring fence around all the endpoints of your IT infrastructure and helps you monitor it from a single command center, making sure that no end user is left unattended at any point. The AI-powered solution creates baseline profiles for each of your users and alerts you every time an end user deviates from their normal behavioral patterns, helping you thwart insider threats in time. Implement controlled and secure access to business-critical applications.
  • 41
    iSecurity Safe-Update

    iSecurity Safe-Update

    Raz-Lee Security

    iSecurity Safe-Update protects IBM i business critical data against updates by unauthorized programs. Such programs are those who come from a library which is not used to store production programs, file editors, DFU and Start SQL (STRSQL). It ensures that updates are made by pre-confirmed programs or by programs that are not known as file editors. Government and industry regulations, including Sarbanes-Oxley (SOX), GDPR, PCI, and HIPAA, stipulate measures that companies must take to ensure proper data security and monitoring. ​They require that only specifically permitted programs can make updates to business-critical data in production environments. Safe-Update guards against unauthorized updates by dangerous programs – programs were not designed for the organization’s business rules and do not comply with them. If an unauthorized update is attempted, a window appears requesting the entry of a ticket.
  • 42
    REDCap

    REDCap

    Vanderbilt University

    REDCap is a secure web application for building and managing online surveys and databases. While REDCap can be used to collect virtually any type of data in any environment (including compliance with 21 CFR Part 11, FISMA, HIPAA, and GDPR), it is specifically geared to support online and offline data capture for research studies and operations. The REDCap Consortium, a vast support network of collaborators, is composed of thousands of active institutional partners in over one hundred countries who utilize and support their own individual REDCap systems. Please visit the Join page to learn how your non-profit organization can join the consortium, or explore the first section on our FAQ for other options to use REDCap.
  • 43
    C2 Backup

    C2 Backup

    Synology C2

    Back up and manage data stored on Windows devices and Microsoft 365 cloud services from an intuitive console. Secure mission-critical data effectively with highly configurable features tailored to businesses. Restore entire devices with bare-metal recovery, or individual Microsoft 365 objects with file-level recovery. Automate data protection and avoid service disruptions with time or event-based backups. Retain as many backup copies as required or according to regulation. Minimize bandwidth usage and storage consumption by backing up only changed data. Make mass deployment easy on both on-premises and cloud deployments with an intuitive setup. Receive email alerts in case of abnormal events so you can keep backup tasks running smoothly. Keep backups locked from others through private keys. Minimize risks of theft and leakage by protecting your data with AES-256 encryption. Your data is protected on servers with 99.999999999% data durability.
  • 44
    Datawiz BES
    The Datawiz BI analytics service helps retailers quickly find answers to essential questions using pre-configured reports, create informative dashboards, and easily share them with colleagues. The service allows users to customize visualizations based on data, simplifying the process of analyzing key metrics in real-time and tracking changes that could impact chain performance. Datawiz offers 35 pre-configured reports that automate core retail processes, utilizing artificial intelligence for fast insight detection. You can add custom metrics, create tailored formulas for analytics, and visualize results through dashboards. The system allows monitoring deviations and managing users. The Store Manager mobile app provides access to analytics on the go. Additionally, you can earn up to 2.5% extra revenue through data monetization. DATAWIZ BI – one of 4 critical solutions and a part of the analytical platform Datawiz BES (Business Effectiveness Solution)
  • 45
    POM Applications Suite
    Physical and Operational (POM)Suite is a comprehensive package for steady-state, transient and small-signal analysis of the electric power system networks in planning and operations environments. It is intended for massive analyses and as such offers parallel and multithreading calculations. The user can work with POM Suite through a graphical user interface(GUI) or command-line interface (CLI). Millions of N-1-1, N-2 contingencies during one simulation run, AC contingency analysis. Automatic optimal corrective actions to alleviate voltage violations, thermal violations and steady-state stability violations. Automatic optimal corrective actions to alleviate transient stability violations. Modeling of complex user-defined Remedial Action Schemes(RAS) actions. Automating and significantly expediting the studies to comply with NERC Standards. Automated AC transfer/load pocket and contingency analyses with visualization.
  • 46
    RPort

    RPort

    RPort

    Get full insights into your servers' cpu usage, memory utilization, disk fill levels, network bandwidth, processes, and more. Monitor internet based servers and their services like websites and email servers from different locations around the globe. Network monitoring of intranets, routers, switches, IP-cameras, printers, and other IP-devices behind a firewall. Stop spending more time configuring your monitoring solution than actually monitoring your network. CloudRadar's simple UX, preconfigured checks and default alerts are designed to get your monitoring running in minutes. No matter if you replace your previous tool or set up a new monitoring.
    Starting Price: $1.50 per host per month
  • 47
    ManageEngine DataSecurity Plus
    Take charge of your sensitive data with ManageEngine DataSecurity Plus. Get a snapshot of recent user activity, file activity, and access trends. Know the essential four Ws for every access: Who accessed what, when, and from where. Focus on events that matter most, such as sudden permission changes, file deletions, and renaming events. Identify the most active users, most accessed files, and most modified files within your file server. rigger instant alerts whenever there's sudden spikes in file or folder access or modification events. Get real-time notifications whenever there's multiple failed access attempts to critical files. Monitor changes made to sensitive files after business hours. Selectively monitor critical files, folders, shares, and user activities. Get real-time alerts whenever unauthorized modifications are made to critical files. Spot privilege misuse and unusual activity by configuring threshold-based alerts to monitor user-generated events.
  • 48
    EasyNAS

    EasyNAS

    EasyNAS

    Without a file system, information placed in a storage medium would be one large body of data with no way to tell where one piece of information stops and the next begins. By separating the data into pieces and giving each piece a name, the information is easily isolated and identified. Taking its name from the way paper-based information systems are named, each group of data is called a “file”. The structure and logic rules used to manage the groups of information and their names is called a “file system”. Network-attached storage (NAS) is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS is specialised for serving files either by its hardware, software, or configuration. It is often manufactured as a computer appliance – a purpose-built specialised computer.
  • 49
    Promodag Reports
    Promodag, a recognized leader in Exchange reporting, offers you a versatile reporting tool on Microsoft Exchange that is compatible with your on-premises or hybrid organizations as well as with your Office 365 tenant. Overlaying governance protocols (SOX, PCI-DSS, HIPAA, GLBA, FISMA) requires the implementation of often complex compliance measures and detailed reporting on messaging use. Promodag Reports for Exchange enables you to respond to requests from IT security and Human Resources managers and to implement a dynamic and proactive security policy. Promodag Reports is particularly suitable for monitoring observance of the "Right to Disconnect" charter within your company, which enshrines employees’ right to disconnect from digital communications outside of regular hours. It reports on the indicators you need to respond quickly and accurately to the demands of Human Resources and business management in the context of the development of telecommuting.
  • 50
    Safend Protector
    Safend Protector prevents internal/external data leakage by monitoring endpoint devices and data flow. Using granular and customizable security policies and rules, Protector automatically detects, permits and restricts files and encrypts media devices. Very intuitive, Protector has strong reporting and analysis capabilities and already complies with PCI, HIPAA, SOX and EU GDPR. Preventing viruses from entering via removable devices, Protector’s AV SCAN blocks each device as soon as it is inserted, checks for viruses and then permits usage according to rules and policies. AV SCAN interfaces with most anti-virus solutions already used to protect data networks, and permits devices when no viruses are found and fully blocks devices that are contaminated. Selected, restricted or blocked endpoint connectivity without compromising on security.