Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

IBM® Sterling Connect:Direct offers a robust solution for secure, point-to-point file transfers, significantly reducing reliance on the less dependable File Transfer Protocol (FTP). This tool is specifically designed to handle high-volume file deliveries efficiently within and between organizations. It guarantees a more dependable process for transferring files, catering to various needs from batch integration and transferring large catalogs or images to synchronizing data with remote sites. Additionally, Sterling Connect:Direct is compatible with hybrid cloud environments, utilizing certified containers that facilitate straightforward and uniform deployment life-cycle management. These IBM Certified Containers for Sterling Connect:Direct are built for enterprise use, featuring a wealth of security measures alongside integrated common software services, which streamline processes such as installation, configuration, upgrade management, and scalability. Moreover, it supports a diverse array of platforms, including IBM z/OS, OpenVMS, i5/OS, HP NonStop, Microsoft Windows, UNIX, and Linux, ensuring extensive compatibility across different systems. As a result, organizations can enhance their file transfer capabilities while maintaining top-notch security and flexibility.

Description

Lynis Enterprise specializes in security scanning for Linux, macOS, and Unix operating systems, enabling users to quickly identify and resolve issues so they can redirect their attention to their core business and projects. This targeted approach is relatively uncommon in an industry saturated with diverse services and software solutions, as we concentrate specifically on Linux and Unix security. The main goal of Lynis is to conduct thorough health checks of systems, which also aids in identifying vulnerabilities and weaknesses in configuration management. As a robust software solution, Lynis Enterprise facilitates security auditing, compliance testing, and the implementation of system hardening measures. With Lynis at its core, this software is tailored for use in environments that utilize Linux, macOS, or other Unix-like systems. Furthermore, Lynis provides valuable insights that empower organizations to enhance their overall security posture effectively.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

IBM Sterling Control Center Monitor
Netdata
Origina

Integrations

IBM Sterling Control Center Monitor
Netdata
Origina

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$90 per year
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/products/connect-direct

Vendor Details

Company Name

CISOfy

Founded

2013

Country

Netherlands

Website

cisofy.com

Product Features

Managed File Transfer (MFT)

API Integration
Authentication / Auditing
Compression
Data Sharing
Data Transmission Protocol Integration
Database Management
Encryption Support
Fail-Over / Load Balancing

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Alternatives

OSE Reviews

OSE

Open Seas
SEEBURGER BIS Reviews

SEEBURGER BIS

SEEBURGER
JDeveloper Reviews

JDeveloper

Oracle