Average Ratings 4 Ratings
Average Ratings 0 Ratings
Description
Empower your team to oversee and control the security, efficiency, and management of your complete IT infrastructure through a unified platform, all without any expense to you. The robust ITarian platform offers a streamlined approach to operations, enhances productivity, and optimizes the use of IT resources. Equip your IT personnel with enhanced monitoring and management functionalities. Increase IT efficiency by integrating roles, functions, and tools seamlessly. Ensure maximum uptime through proactive identification and resolution of issues. Streamline daily operations by automating routine tasks using custom scripts, thereby allowing your staff to focus on more strategic initiatives. This holistic approach not only improves workflows but also fosters innovation within your organization.
Description
Zeek, initially known as Bro, stands as the premier platform for monitoring network security. It is an adaptable, open-source solution driven by those dedicated to defense in the cybersecurity realm. With its origins tracing back to the 1990s, the project was initiated by Vern Paxson to gain insights into activities on university and national laboratory networks. In late 2018, to acknowledge its growth and ongoing advancements, the leadership team transitioned the name from Bro to Zeek. Unlike conventional security tools such as firewalls or intrusion prevention systems, Zeek operates passively by residing on a sensor, which can be a hardware, software, virtual, or cloud-based platform, that discreetly monitors network traffic. By analyzing the data it collects, Zeek generates concise, high-quality transaction logs, file contents, and customizable outputs that are well-suited for manual examination on storage devices or through more user-friendly applications like security information and event management (SIEM) systems. This unique approach allows for a deeper understanding of network activities without interfering with the traffic itself.
API Access
Has API
API Access
Has API
Integrations
Cybraics
Dropzone AI
Elastic Observability
IronNet Collective Defense Platform
LimaCharlie
Malcolm
NXLog
Observe
Onum
Security Onion
Integrations
Cybraics
Dropzone AI
Elastic Observability
IronNet Collective Defense Platform
LimaCharlie
Malcolm
NXLog
Observe
Onum
Security Onion
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
Free
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
ITarian
Founded
2018
Country
United States
Website
www.itarian.com
Vendor Details
Company Name
The Zeek Project
Founded
1994
Country
United States
Website
zeek.org
Product Features
Business Continuity
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration
Help Desk
Alerts / Escalation
Automated Routing
Community Forums
Customizable Branding
Document Storage
Email Integration
IT Asset Management
Incident Management
Interaction Tracking
Knowledge Base
Known Issue Management
Live Chat
Multi-Channel Communication
Multiple Brands / Products
Network Monitoring
Real-time Chat
Self Service Portal
Service Level Agreement (SLA) Management
Ticket Management
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Service
Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management
ITSM
Asset Tracking
Availability Management
Change Management
Configuration Management
Contract/License Management
Dashboard
Incident Management
Problem Management
Project Management
Release & Deployment Management
Self Service Portal
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
MSP
Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Patch Management
Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning
Remote Support
Diagnostic Tools
File Transfer
Live Chat
Real-time Chat
Remote Control
Screen Sharing
Session Recording
Session Transfer
Surveys & Feedback
RMM
Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management
Product Features
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning