Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ManageEngine Endpoint Central Reviews & Ratings
    2,936 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    24 Ratings
    Company Website
  • NinjaOne Reviews & Ratings
    4,659 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    521 Ratings
    Company Website
  • MOVEit Reviews & Ratings
    622 Ratings
    Company Website
  • Iru Reviews & Ratings
    1,282 Ratings
    Company Website
  • JDisc Discovery Reviews & Ratings
    27 Ratings
    Company Website
  • Feroot Reviews & Ratings
    30 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    684 Ratings
    Company Website

What is Promisec Endpoint Manager?

PEM provides an essential function for IT teams responsible for overseeing software patch management across all organizational endpoints and servers. This innovative solution offers extensive visibility and control over activities on your endpoints and servers, enabling swift action in response to detected threats. With PEM, you achieve total oversight of all files, registry entries, processes, network connections, third-party applications, and operating system versions throughout the enterprise. By employing cutting-edge agentless technology, PEM effectively scans the entire organization to identify, assess, and remediate security vulnerabilities. It is crafted to perform efficiently across diverse networks, supporting a broad array of applications, ranging from compliance with regulations to enhancing cybersecurity measures. Additionally, its scalability guarantees that organizations can modify it to meet their changing requirements without sacrificing performance, ensuring continued protection as the organization evolves. This adaptability makes PEM an indispensable asset for maintaining robust security protocols in a dynamic business environment.

What is NetLib Encryptionizer?

SQL Server offers Transparent Data Encryption across its range of editions, from Express to Enterprise, without the need for programming. This feature is designed to be user-friendly for developers, allowing for seamless integration with SQL Server applications. It serves as a cost-effective solution for those looking to avoid the expenses associated with upgrading to SQL Server Enterprise. Additionally, it helps organizations adhere to multiple regulatory requirements while safeguarding both intellectual property and sensitive data. Furthermore, this encryption capability enhances data security and fosters trust with clients and stakeholders.

Media

Media

Integrations Supported

Portnox Security

Integrations Supported

Portnox Security

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Promisec

Company Website

www.promisec.com

Company Facts

Organization Name

NetLib Security

Date Founded

1997

Company Location

United States

Company Website

netlibsecurity.com

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

HIPAA Compliance

Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management

Categories and Features

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

HIPAA Compliance

Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management

NoSQL Database

Auto-sharding
Automatic Database Replication
Data Model Flexibility
Deployment Flexibility
Dynamic Schemas
Integrated Caching
Multi-Model
Performance Management
Security Management

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

SQL Server

CPU Monitoring
Credential Management
Database Servers
Deployment Testing
Docker Compatible Containers
Event Logs
History Tracking
Patch Management
Scheduling
Supports Database Clones
User Activity Monitoring
Virtual Machine Monitoring

Popular Alternatives

SanerNow Reviews & Ratings

SanerNow

SecPod Technologies

Popular Alternatives

Sealit Reviews & Ratings

Sealit

Sealit Technologies
EncryptRIGHT Reviews & Ratings

EncryptRIGHT

Prime Factors