Ratings and Reviews 0 Ratings
Ratings and Reviews 397 Ratings
What is PA File Sight?
The system effectively detects and mitigates ransomware threats that arise from the network, while also utilizing honeypots and heuristic detection techniques. It ensures that compromised devices cannot access files on other protected servers within the network. Additionally, it has the ability to track user activities related to file copying and can limit access as needed. With real-time alerts, designated team members can promptly investigate any issues that arise. The Ultra features are essential for optimal performance. It monitors activities associated with file deletions, transfers, or accesses, making it a popular choice for compliance purposes. Enhancing these capabilities, the Ultra version logs information into a database, facilitating comprehensive reporting. Furthermore, it restricts operation to only trusted applications, providing protection against various malware threats, a method referred to as Application Whitelisting. This multifaceted strategy not only ensures robust security but also helps organizations uphold a compliant digital landscape, fostering greater confidence in their operational integrity. Ultimately, such measures are crucial for maintaining trust and safeguarding sensitive information.
What is ManageEngine ADAudit Plus?
ADAudit Plus offers comprehensive insights into all activities within your Windows Server environment, ensuring both safety and compliance. This tool provides an organized perspective on modifications made to your Active Directory (AD) resources, encompassing AD objects, their attributes, group policies, and much more. By implementing AD auditing, you can identify and address insider threats, misuse of privileges, or other potential security breaches. It grants a thorough overview of all elements in AD, including users, computers, groups, organizational units, and group policy objects. You can monitor user management actions such as deletions, password resets, and changes in permissions, along with information detailing who performed these actions, what was done, when it happened, and where. To maintain a principle of least privilege, it's essential to track additions and removals from both security and distribution groups, enabling better oversight of user access rights. This ongoing vigilance not only helps in compliance but also fortifies the overall security posture of your server environment.
Integrations Supported
Active Directory
Azure Marketplace
Microsoft Entra ID
API Availability
Has API
API Availability
Has API
Pricing Information
$199 one-time payment
Free Trial Offered?
Free Version
Pricing Information
$595.00/year
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Power Admin
Date Founded
2003
Company Location
United States
Company Website
www.poweradmin.com
Company Facts
Organization Name
Zoho
Date Founded
1996
Company Location
India
Company Website
www.manageengine.com/products/active-directory-audit/active-directory-auditing-solutions.html
Categories and Features
Audit
Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management
Categories and Features
Audit
Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
HIPAA Compliance
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring