Product and Services Finder

Network Audit Software

    
<  1  2  3  4  5  6  11  17  >
Operative Software Products  Operative Software Products focus on system monitoring and deploying IT infrastructure, batch job scheduling, network protocol and application performance analyzers, test tools for software, network traffic generation...
 
Network Planning Software Candela Technologies creates LANforge - network testing and simulation solutions. Candela LogoPerfect for Stress and Load Testing of networks and devices....
SmartDraw.com  SmartDraw.com is the creator of SmartDraw, software that helps you work smarter by communicating visually. Because people are six times more likely to retain and understand information presented to them visually,...
Network Intelligence  Network Intelligence Corp. is an innovator in Security Event Management.
Rivo Software Ltd.  Rivo Software serves a global client base from offices in the UK and USA. With clients in 71 countries, Rivo provides an enterprise level software solution, Safeguard, to manage business risk and compliance. Safeguard is...
Vela's Network Security Services  Vela Network Security provides monitoring and notification solutions designed to maintain the security of your network environment.
TriGeo Network Security  TriGeo Network Security is focused on Security Event Management.
Layton Technology  Layton Technology is a global developer of IT auditing and help desk software solutions. Our Windows-based suite of products enables companies to manage and internally support their technology assets, enterprise-wide, to...
Layton Technology  Layton Technology is a privately owned company with its head office in Tampa, Florida, USA. We have other offices around the world in Great Britain, Australia, New Zealand and Singapore.
Front Range  front range
Vyapin Software Systems (P) Ltd  VYAPIN develops solutions for Systems, Security, Migration and Compliance management. Our software products for the Microsoft infrastructure assist in Systems Administration, Configuration Tracking and Reporting, Systems...
NetworkView Software  NetworkView was developed because it is the kind of software you need every day
Coactive Networks  Coactive Networks connects networks to the real world, extending Internet access to all of the devices, appliances, and computers in our homes and businesses.
Netilla Networks  Netilla Networks has focused on providing manageable solutions for making business networks accessible for diverse groups of users securely.
<  1  2  3  4  5  6  11  17  >

Network Audit Software - Product Reviews

Network audit and compliance tools form a fractured market, but integrated solutions and network analysis provide a look ahead.

Network audit and compliance software should give network managers a complete view of their network at all times, plus allow for quick action when necessary to act against vulnerabilities, threats, losses or compliance infractions. Open source tools can often meet basic needs, and disparate point solutions are still common as audit and compliance software matures.

Trends for network audit and compliance software are products that perform integrity monitoring for real-time file integrity and device configuration monitoring. Network collection and forensics tools are emerging to top traditional signature-based capabilities. Audit and compliance software should allow governance across all functional areas, offer a simple interface, and be comprehensive, looking at the entire network, as well as devices and ports,

Best-in-Class Network Audit and Compliance Software Features:

  • Easily allows organizations to meet industry security configuration standards and government regulations
  • Offers change and configuration management to ensure that network changes meet regulations, with zero downtime
  • Provides for governance across many functional areas in an organization to move toward an integrated approach

Top Considerations before Buying Network Audit and Compliance Software Products:

Look for an integrated compliance approach to avoid management headaches around point solutions and manual processes. Smarter network analysis and forensics can spot potential problems quickly and with less work from IT. Consider whether an agentless approach could work, and look for solutions that allow configuration changes with zero downtime. And network audit and compliance software should always ensure that system changes don’t violate government regulations.

Key Products:

1. nCircle Suite360 provides automated security and compliance auditing through an agentless product line. It can audit IT functionality across a global network, with automatic vulnerability discovery, audits for configuration compliance and file integrity monitoring. nCircle aims for an overall view of an organization’s IT to eliminate having to manage separate products. Using an agentless product means that nCircle audits all assets and devices, including IP phones, routers, switches, firewalls and printers. Dashboards and automated reports add to ease of use.

2. APEX Analytix offers audit technology and services, including accounts payable, retail and sales tax audits, and contract and freight compliance. They provide comprehensive reports around each audit, and include contract compliance, best practice implementation, spend analysis and benchmarking, among others. Their FirstStrike Fraud Detect continuous monitoring program examines vendor fraud to report on high-risk situations and transactions. APEX claims that it achieves a 95% to 99% prevention rate, which has been borne out by followup audits.

3. NetWrix Corporation develops solutions that simplify the management of Windows networks and automate systems management and compliance. Their primary offerings focus on regulatory compliance, identity management and change auditing for changes to system configurations. They also offer freeware, like a disk space monitor, inactive users tracker, password expiration notifier, USB blocker and VMware change reporter. Some freeware tools have advanced commercial versions available.

4. Polivec’s EGS Policy Center integrates the management of risk and governance across the enterprise. Administrators can create and store policies to meet regulations, with all procedures and tasks in one place. The solution also informs employees, collects real-time compliance data, highlights compliance lapses and signal management of lapses. It also includes policy review and version and access control. Polivec’s customers are in financial, government, retail, energy, healthcare, entertainment and high technology.

5. BrainTree Technology makes dbDataFinder software, which scans an enterprise to pinpoint sources of confidential data as well as additional subsets, copies, and exports of that data. It can identify files and databases that contain confidential data, payment card information or customer data, within spreadsheets, Access databases, Oracle and SQL RDBMS and other document and file types. Their solutions are designed to ensure PCI and customer data, as well as confidential and privacy-related data.

Network Systems Management (Audit and Compliance Software)
Definition: Network Systems Management refers to the activities, methods, procedures and tools that pertain to the operation, administration and provisioning of networked systems. A common way of characterizing network management functions is FCAPS – Fault, Configuration, Accounting, Performance and Security.

More

Network Audit Software Research Library

Automated Penetration Testing - Justification and ROI
Core Security Technologies
This paper will help you justify the need for automated penetration testing software and demonstrate the positive Return on Investment (ROI) that can be achieved by acquiring a product such as CORE IMPACT Pro. It reviews the latest trends in cybercrime, outlines the cost of security breaches, and demonstrates how penetration testing can help manage vulnerabilities to defend against these threats. ...
 
The Expanding Network Perimeter
Symtrex, Inc.
How to Protect it With Unified Threat Management As the perimeter of networks continues to expand—to include the cloud, mobile devices and a new generation of virtual road warriors—authenticating users exclusively through a network gateway is no longer enough to keep your network protected. Unified threat management (UTM) integrates endpoint protection and management on the same gateway, ...
 
NetClarity - Protect your Internal Network
Symtrex, Inc.
Mid-sized businesses need internal network security The Smaller You Are, the Harder You Fall: A breach can be detrimental for small to mid-size businesses and hackers are now targeting smaller companies In the early days of the Internet, a firewall, intrusion prevention system, and anti-virus program were enough to protect your network from hackers. Yet as the threat landscape evolved and the ...
 
Eight Trends That Are Changing Network Security
Symtrex, Inc.
Eight Trends That Are Changing Network Security Technology in the network security space has been through many dramatic changes recently. New mobile operating systems, growing use of personal devices, and SaaS (software-as-a-service) delivery make securing the network a growing challenge. Enhancements in the network infrastructure that connect devices within or across the network make all these ...
 
Automated Penetration Testing: Can IT Afford Not To?
Core Security Technologies
In this white paper we provide an overview of penetration testing, discuss security vulnerabilities, and summarize the results and benefits of penetration testing realized by the IT executives interviewed. We also present the features and benefits of Core Security Technologies’ CORE IMPACT, a leading product in the penetration testing space.
 

Network Audit Software Video

Expert Observer VoIP Analyzer and Monitor Operative Software Products The Expert Observer VoIP solution provides detailed packet analysis and historical trending. Observer offers advanced analytics to quantify call ...
 
LANforge Network Traffic Generator Operative Software Products Traffic Generation simulates the edge of the network under test. LANforge FIRE can generate FTP, HTTP, VoIP (SIP, RTP, RTCP), TCP/IP, UDP/IP, Ethernet and ...
 
Network Audit Software Operative Software Products Products

Network Audit Software News

Network Audit Software InterMapper Products
Network Audit Software Sportsborg Information
Copyright © 2014, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.