Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

X-FIRE™ (pronounced “crossfire”) stands out as Agnovi’s premier investigative case management software tailored specifically for police and law enforcement professionals. Created with the needs of investigators in mind, X-FIRE serves as the leading solution for managing significant investigations from the onset of the incident to the final steps of court disclosure. Its user-friendly interface, coupled with comprehensive features, makes it both a powerful and cost-effective choice. The software boasts advanced disclosure controls that safeguard sensitive information related to investigations, and it facilitates case categorization that enhances operational metrics. Additionally, X-FIRE seamlessly integrates incident management and tracking capabilities, ensuring a smooth workflow. It is compatible with major database systems such as Microsoft SQL Server, Oracle, and MySQL, and includes customizable workflow management, as well as tools for tracking investigator time, expenses, and assets. Feedback from law enforcement agencies has played a crucial role in driving the significant enhancements made to X-FIRE. With its ability to support large investigative teams, X-FIRE offers advanced workflow solutions, sophisticated communication tools, and robust business intelligence functionalities that are essential for modern law enforcement operations. This makes X-FIRE not only a tool but a partner in the pursuit of justice.

Description

FireWally is a complimentary firewall application for Mac, enhanced by Apple Intelligence, crafted for individuals seeking to exercise comprehensive control over their internet activities. Designed with a focus on privacy, FireWally features a sleek interface that allows users to monitor applications, prevent unwanted connections, and safeguard their data effortlessly. Highlighted Features: - Monitor active applications in real-time. - Effortlessly block unwanted app connections with a single click. - Analyze traffic history for either the past hour or the entire day. - Receive intelligent insights regarding app online behavior, powered by Apple Intelligence. Utilize FireWally to maintain control over your network, minimize unnecessary data usage, and ensure that your Mac's online engagements remain secure and transparent. With FireWally from Nektony, managing your application connections has never been simpler and more efficient.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

No images available

Integrations

MySQL
Oracle Database
SQL Server

Integrations

MySQL
Oracle Database
SQL Server

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

Free
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Agnovi

Founded

2001

Country

Canada

Website

www.agnovi.com

Vendor Details

Company Name

Nektony

Founded

2011

Country

Ukraine

Website

nektony.com/firewally

Product Features

Investigation Management

Contact Management
Data Management
Incident Management
Reporting & Statistics
Subject Profiles

Law Enforcement

Case Management
Certification Management
Court Management
Court Management Integration
Crime Scene Management
Criminal Database
Dispatching
Evidence Management
Field Reporting
Incident Mapping
Internal Affairs Administration
Investigation Management
Scheduling

Product Features

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Alternatives

Alternatives

Polonious Reviews

Polonious

Polonious Systems
Case Closed Software Reviews

Case Closed Software

Crime Tech Solutions