Jama Connect
Jama Software® is focused on maximizing innovation success in multidisciplinary engineering organizations. Numerous firsts for humanity in fields such as fuel cells, electrification, space, software-defined vehicles, surgical robotics, and more all rely on Jama Connect® requirements management software to minimize the risk of defects, rework, cost overruns, and recalls.
Using Jama Connect, engineering organizations can now intelligently manage the development process by leveraging Live Traceability™ across best-of-breed tools to measurably improve outcomes. Our rapidly growing customer base spans the automotive, medical device, life sciences, semiconductor, aerospace & defense, industrial manufacturing, consumer electronics, financial services, and insurance industries.
Learn more
Curtain LogTrace File Activity Monitoring
Curtain LogTrace File Activity Monitoring is an enterprise file activity monitoring solution. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
Key features:
- File log (create & delete file)
- File log (copy & move file)
- File log (print & rename file)
- App log (save, open & close file)
- Support MySQL & MS SQL
- Watermark for printout
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Licensing:
Curtain LogTrace is shareware. You can download and use the software for free on a trial basis or commercial use. If you want to log more file events (e.g. print, rename, save, open and close) and some advanced features, you need to activate the software to paid version.
Learn more
Varonis Data Security Platform
The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
Learn more