Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Aikido Security Reviews & Ratings
    71 Ratings
    Company Website
  • phoenixNAP Reviews & Ratings
    6 Ratings
    Company Website
  • Kasm Workspaces Reviews & Ratings
    123 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    372 Ratings
    Company Website
  • V2 Cloud Reviews & Ratings
    254 Ratings
    Company Website
  • Netwrix Auditor Reviews & Ratings
    296 Ratings
    Company Website
  • Safetica Reviews & Ratings
    356 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    489 Ratings
    Company Website
  • StandardFusion Reviews & Ratings
    88 Ratings
    Company Website
  • Google Compute Engine Reviews & Ratings
    1,111 Ratings
    Company Website

What is Runecast ?

Runecast is a comprehensive IT solution designed for enterprises that helps Security and Operations teams optimize their time and resources by facilitating a forward-thinking strategy for IT operations management, cloud security posture management, and compliance. With this all-in-one platform, your team can enhance their efficiency and effectiveness while managing all aspects of your cloud infrastructure, resulting in greater visibility, improved security measures, and significant time savings. Security personnel experience streamlined vulnerability management and adherence to various compliance standards, covering a wide range of technologies. Meanwhile, Operations teams can minimize their operational costs and gain better clarity, empowering them to adopt a proactive stance and focus on the essential tasks that truly matter to your organization. This holistic approach not only supports team productivity but also strengthens your overall IT ecosystem.

What is Qualys File Inventory Monitoring (FIM)?

Gain thorough, real-time visibility of risks at the file level for accurate compliance and oversight through a centralized dashboard and a unified agent. This robust system maintains continuous monitoring of vital assets for any changes across both cloud and on-premises environments, catering to businesses of all sizes, including large global enterprises. By integrating trustworthy threat intelligence and incorporating File Reputation context, it enhances alert prioritization while reducing the frequency of unnecessary notifications. The system features File Access Management (FAM), which triggers alerts when essential host files, designated for restricted access, are accessed. Moreover, it offers agentless capabilities for network devices, enabling notifications for any changes in network configurations. With established monitoring profiles, it adheres to compliance requirements for regulations such as PCI DSS 4.0, NERC CIP, FISMA, SOX, NIST, HIPAA 2023, CIS18, GDPR, and many others, providing extensive compliance coverage across multiple industries. This all-encompassing strategy not only fulfills compliance obligations but also significantly bolsters the overall security posture of organizations, ultimately fostering a safer digital environment. Additionally, this system empowers organizations to proactively address potential vulnerabilities, ensuring they stay ahead of emerging threats.

Media

Media

Integrations Supported

HPE Ezmeral
Jira Align
ServiceNow
VMware vSphere

Integrations Supported

HPE Ezmeral
Jira Align
ServiceNow
VMware vSphere

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Runecast Solutions

Date Founded

2014

Company Location

United Kingdom

Company Website

www.runecast.com

Company Facts

Organization Name

Qualys

Date Founded

1999

Company Location

United States

Company Website

www.qualys.com/apps/file-integrity-monitoring

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Data Center Management

Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

HIPAA Compliance

Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management

Network Monitoring

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Server Virtualization

Audit Management
Health Monitoring
Live Machine Migration
Multi-OS Virtual Machines
Patching / Backup
Performance Log
Performance Optimization
Rapid Provisioning
Security Management
Type 1 / Type 2 Hypervisor

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Categories and Features

Popular Alternatives

Popular Alternatives

Sunbird DCIM Reviews & Ratings

Sunbird DCIM

Sunbird Software Inc.
Fidelis Halo Reviews & Ratings

Fidelis Halo

Fidelis Security
FileVantage Reviews & Ratings

FileVantage

CrowdStrike