Software > IT Security > IT surveillance, monitoring

IT surveillance, monitoring - Current market overview

In this SoftGuide section you will find an overview of software and solutions on the subject of IT monitoring and surveillance. The software listed here is used for monitoring and performance monitoring of networks and computers as part of the service. The IT monitoring and supervision software listed here usually supports performance measurement, end-to-end monitoring, response time measurement and provides application averages and log files. Often the software also provides trend analysis of future performance needs for hardware, operating systems and applications. In addition, monitoring software can usually be used to demonstrate compliance with service level agreements (SLAs).

Let us do the

show 1 to 3 (of 3 entries)
BIC Process Design
Professional process modeling for BPM, GRC and QM
Professional process modeling for BPM, GRC and QM With the help of the BIC Process Design software, all processes can be professionally monitored and simultaneously controlled. Particularly advantageous are components process modeling as well as the process portal and governance workflows.
tiggs.security.management
Eine leistungsstarke Plattform
Eine leistungsstarke Plattform tiggs.security.management ist eine leistungsstarke Plattform, mit deren Hilfe maximale Transparenz der zu überwachenden IT-Systeme gewährleistet werden kann. Sicherheitsexperten erhalten durch Modellierung, Simulation und Analysen die erforderliche Übersicht, die sie für die Bekämpfung gefährlicher Sicherheitslücken und Schwachstellen benötigen.
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management tenfold is a powerful and user-friendly identity and access management software. Managing access rights has never been easier! Organize your file servers: tenfold is perfectly tailored to meet the demands of Microsoft environments. The software creates all Active Directory accounts automatically and builds the necessary access structures in accordance with best practices right from the start. Data owners are included into specified workflows. tenfold helps you maintain control over who has access to which folders at any time.
show 1 to 3 (of 3 entries)
1

Let us suggest suitable software!

Professional search for suitable software also taking into account the current software trends.

Search in similar categories:

Show all 336 Software categories