Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • phoenixNAP Reviews & Ratings
    6 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    155 Ratings
    Company Website
  • Kasm Workspaces Reviews & Ratings
    123 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    71 Ratings
    Company Website
  • Device42 Reviews & Ratings
    173 Ratings
    Company Website
  • netTerrain DCIM Reviews & Ratings
    23 Ratings
    Company Website
  • Pulseway Reviews & Ratings
    460 Ratings
    Company Website
  • Paessler PRTG Reviews & Ratings
    696 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    408 Ratings
    Company Website
  • ManageEngine OpManager Reviews & Ratings
    1,383 Ratings
    Company Website

What is Symantec Data Center Security?

Thorough protection, management, and micro-segmentation of workloads are crucial for private cloud and on-premises data center environments. This process involves strengthening security protocols and offering monitoring solutions tailored for private cloud systems and physical data centers, while also accommodating Docker containerization support. The use of agentless protection for Docker containers enables comprehensive application control and simplifies management efforts. To counteract zero-day vulnerabilities, it is imperative to implement application whitelisting, detailed intrusion prevention strategies, and real-time file integrity monitoring (RT-FIM). Furthermore, securing OpenStack deployments necessitates a diligent hardening of the Keystone identity service module. Ongoing surveillance of data center security is essential for ensuring safe operations in both private clouds and physical setups. In addition, improving security efficacy in VMware environments can be facilitated through the adoption of agentless antimalware solutions, along with network intrusion prevention and file reputation services, which together enhance overall security resilience. Ultimately, the implementation of robust security measures is critical for protecting sensitive information within these infrastructures, as the stakes for data breaches continue to rise. Ensuring that these protections are kept up-to-date will further fortify defenses against evolving threats.

What is CimTrak Integrity Suite?

Safeguarding your organization from both internal and external threats is crucial for meeting compliance standards and regulations. With CimTrak’s comprehensive change management, auditing, and reporting capabilities, organizations in both the private and public sectors can effectively fulfill or even exceed rigorous compliance requirements. Whether addressing standards such as PCI, SOX, HIPAA, CIS, NIST, and others, CimTrak offers extensive protection. Its File and System Integrity monitoring is specifically engineered to shield essential files from modifications, whether they stem from malicious intent or inadvertent actions, thereby maintaining the integrity of your IT infrastructure and safeguarding sensitive information in compliance with regulations like PCI. In the rapidly changing IT landscape, alterations are inevitable. CimTrak delivers an integrated, user-friendly, and cost-effective solution for integrity monitoring, proactive incident management, change control, and auditing, positioning itself as an essential asset for contemporary businesses. By simplifying these critical processes, it allows organizations to concentrate on their primary functions while ensuring both compliance and security are upheld. Ultimately, the adoption of CimTrak can significantly enhance an organization’s operational efficiency, allowing for better resource allocation and risk management.

Media

Media

Integrations Supported

CA Auditor for z/OS
EnCase Forensic
FortiSandbox
HP-UX
HPE OpenVMS
NorthStar Navigator
OctoXLabs

Integrations Supported

CA Auditor for z/OS
EnCase Forensic
FortiSandbox
HP-UX
HPE OpenVMS
NorthStar Navigator
OctoXLabs

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/products/cybersecurity/endpoint/hybrid-cloud/data-center-security

Company Facts

Organization Name

Cimcor

Date Founded

1997

Company Location

United States

Company Website

www.cimcor.com

Categories and Features

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Data Center Management

Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Popular Alternatives

Fidelis Halo Reviews & Ratings

Fidelis Halo

Fidelis Security

Popular Alternatives

Runecast  Reviews & Ratings

Runecast

Runecast Solutions
Tripwire Reviews & Ratings

Tripwire

Fortra
Fidelis Halo Reviews & Ratings

Fidelis Halo

Fidelis Security