Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

This section presents products that facilitate alarm notifications derived from various data sources. The UCME-OPC connects to numerous OPC servers, whereas the UCME-SmartConnector interfaces with Schneider Electric’s EcoStruxure building operation systems. Both solutions provide a range of multi-channel notification options, including SMS, WhatsApp, VoIP, push notifications, voice-over-telephony, and email. These products seamlessly integrate with various systems such as SCADA, HMI, DCS, BMS, historians, and OPC servers. Users can effortlessly import and manage alarms, recipients, and escalation procedures using Microsoft Excel, which helps optimize both time and financial resources. Additionally, the alarm snapshots feature compiles all relevant information into a single message for convenience. Furthermore, this section also highlights products designed for efficient data transfer. By utilizing the OPC Client/Server model, these communication tools can be integrated into Schneider Electric’s EcoStruxure Building Operation systems, allowing for connectivity with third-party OPC servers and clients for enhanced data management. This interconnectedness not only streamlines operations but also improves overall system efficiency and reliability.

Description

If your business is associated with vital infrastructure or sensitive information, you recognize the potential repercussions of a security breach that a malicious actor could exploit. Adhering to legal security standards such as SOC2, HIPAA, and PCI DSS, you are obligated to arrange penetration tests conducted by an external firm. Your clientele insists on collaborating solely with trustworthy and secure solutions, and you fulfill this commitment by ensuring the security of your systems through the outcomes of penetration testing. A penetration test simulates an actual hacking attempt, but it is carried out by skilled professionals dedicated to safeguarding your web security for the right reasons. We at Dhound perform penetration testing—also referred to as pen tests or ethical hacking—so you can relax, knowing your systems are protected. Unlike a straightforward vulnerability assessment, our ethical hacking approach at Dhound goes beyond merely identifying weaknesses; we adopt the mindset and strategies of hackers to stay one step ahead of those who wish to cause harm. This proactive stance ensures that your security measures are continually evolving and improving.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Microsoft Excel
WhatsApp
WordPress

Integrations

Microsoft Excel
WhatsApp
WordPress

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$30 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Control See

Founded

1994

Country

Israel

Website

www.controlsee.com

Vendor Details

Company Name

IDS Global

Founded

2014

Country

United Kingdom

Website

dhound.io

Product Features

IT Alerting

Alert Noise Reduction
Alert Routing
Dynamic Notifications
Enriched Incident Context
Escalation Policies
Incident History Audit
Multi-User Alerting
Multiple Alert Types
On-Call Management
Rich HTML Email Notifications

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Alerting

Alert Noise Reduction
Alert Routing
Dynamic Notifications
Enriched Incident Context
Escalation Policies
Incident History Audit
Multi-User Alerting
Multiple Alert Types
On-Call Management
Rich HTML Email Notifications

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Website Monitoring

Availability Testing
Event Logs
Event-Based Notifications
FTP Monitoring
Mail Server Monitoring
Maintenance Scheduling
Performance Metrics
Real Time Monitoring
Transaction Monitoring
Uptime Reporting

Alternatives

EcoStruxure Triconex Reviews

EcoStruxure Triconex

Schneider Electric
AlertFind Reviews

AlertFind

Aurea
Klaxon Reviews

Klaxon

Klaxon Technologies