Software > IT Security > IT surveillance, monitoring

IT surveillance, monitoring - Current market overview

In this SoftGuide section you will find an overview of software and solutions on the subject of IT monitoring and surveillance. The software listed here is used for monitoring and performance monitoring of networks and computers as part of the service. The IT monitoring and supervision software listed here usually supports performance measurement, end-to-end monitoring, response time measurement and provides application averages and log files. Often the software also provides trend analysis of future performance needs for hardware, operating systems and applications. In addition, monitoring software can usually be used to demonstrate compliance with service level agreements (SLAs).

Leave us the

show 1 to 3 (of 3 entries)
BIC Process Design
Professional process modeling for BPM, GRC and QM
Professional process modeling for BPM, GRC and QM
With the help of the BIC Process Design software, all processes can be professionally monitored and simultaneously controlled. Particularly advantageous are components process modeling as well as the process portal and governance workflows.
tiggs.security.management
Eine leistungsstarke Plattform
Eine leistungsstarke Plattform
tiggs.security.management ist eine leistungsstarke Plattform, mit deren Hilfe maximale Transparenz der zu überwachenden IT-Systeme gewährleistet werden kann. Sicherheitsexperten erhalten durch Modellierung, Simulation und Analysen die erforderliche Übersicht, die sie für die Bekämpfung gefährlicher Sicherheitslücken und Schwachstellen benötigen.
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold is a powerful and user-friendly identity and access management software. Managing access rights has never been easier! Organize your file servers: tenfold is perfectly tailored to meet the demands of Microsoft environments. The software creates all Active Directory accounts automatically and builds the necessary access structures in accordance with best practices right from the start. Data owners are included into specified workflows. tenfold helps you maintain control over who has access to which folders at any time.
show 1 to 3 (of 3 entries)
1

Search in similar categories:

Backup, Data Protection Data protection ISMS - Information Security Management Mobile-Device-Management (MDM, EMM) Virtualization
Show all 336 Software categories