Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
BelManage allows users reduce their software license costs, monitor their cybersecurity status, and IT configuration details. BelManage is based upon Belarc's Cloud architecture. It uses a single Intranet Server and Database and automatically creates a central repository (CMDB), which contains software, hardware, and security configuration details. Belarc's cloud architecture makes it easy to automate and simplify the monitoring of all desktops, laptops and servers around the globe. It uses a single server/database. The BelManage server is available on-premise, hosted by our customer or hosted by Belarc via SaaS.
Description
This integrated solution can perform active, passive, and agent-based assessments. It also allows for flexibility in evaluating risk according to each business. SAINT's remarkable, flexible, and scalable scanning capabilities make it stand out from other solutions in this market. SAINT has partnered up with AWS to allow its customers to benefit from AWS's efficient scanning. SAINT also offers Windows scanning agents for subscribers. Security teams can easily schedule scans, configure them with a lot of flexibility, and fine-tune their settings with advanced options.
API Access
Has API
API Access
Has API
Integrations
Cisco Identity Services Engine (ISE)
Dradis
IBM QRadar SIEM
ServiceNow
ServiceNow Asset Management
ServiceNow Configuration Management Database
Splunk Enterprise
Integrations
Cisco Identity Services Engine (ISE)
Dradis
IBM QRadar SIEM
ServiceNow
ServiceNow Asset Management
ServiceNow Configuration Management Database
Splunk Enterprise
Pricing Details
$10 per computer
Free Trial
Free Version
Pricing Details
$1500.00/year/user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Belarc
Founded
1998
Country
United States
Website
www.belarc.com/products/belmanage
Vendor Details
Company Name
Carson & SAINT
Founded
1997
Country
United States
Website
www.carson-saint.com/products/saint-security-suite/vulnerability-management/
Product Features
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Asset Management
Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Incident Management
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
IT Asset Management
Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning