Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The InfoServ CRM Platform is committed to upholding stringent security measures to safeguard your data effectively. It employs robust and secure connections that utilize a variety of authentication and authorization methods. Additionally, our infrastructure complies with essential standards to ensure the secure management of your enterprise information. We offer an extensive range of security features, including scalable and redundant online infrastructures, ongoing monitoring of production systems, and external penetration testing to validate system security. Moreover, our setup includes multiple internet backbone connections that guarantee routing redundancy and optimal performance. We also implement a continuous network traffic monitoring system and utilize servers hosted in redundant facilities that are automatically backed up. Our power systems are equipped with multiple power feeds, UPS devices, and backup generators to maintain uninterrupted operations. To enhance our security measures further, we prioritize ongoing performance reviews and diligently track system performance metrics to ensure they remain within acceptable limits, thus reinforcing our commitment to your data's security.
Description
Centralized security management effectively connects the often-disparate IT and SOC departments, facilitating a more cohesive approach to protection and deployment strategies. By adopting this interconnected method, organizations can enhance their visibility and security, simplify their processes, and minimize repetitive tasks in security management, ultimately leading to a more robust defense and a streamlined experience for users. Utilizing visual timelines, this system allows for the identification of threat activity patterns across all user devices and organizational groups, thus closing any potential security gaps. Additionally, it reduces overall security management expenses by freeing up time and lightening the IT workload. With a single console, there's no need for constant switching; you can configure policies, oversee threat and data protection, and conduct in-depth investigations all from one central interface. This comprehensive approach provides a unified perspective on your security status through ongoing monitoring and centralized insight. Furthermore, the system is designed for seamless integration with your SOC, enhancing collaborative efforts in safeguarding your organization.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Amazon Web Services (AWS)
Apache CloudStack
AriLinc
Chronicle SOAR
Docker
Google Cloud Platform
IBM Cloud
Kubernetes
Microsoft 365
Integrations
Active Directory
Amazon Web Services (AWS)
Apache CloudStack
AriLinc
Chronicle SOAR
Docker
Google Cloud Platform
IBM Cloud
Kubernetes
Microsoft 365
Pricing Details
$12 per month
Free Trial
Free Version
Pricing Details
$37.75 per user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
DAN electronic
Founded
1991
Country
Bulgaria
Website
www.infoserv.eu
Vendor Details
Company Name
Trend Micro
Founded
1989
Country
Japan
Website
www.trendmicro.com/en_us/business/technologies/control-manager.html
Product Features
Contact Management
Activity Management
Appointment Management
Contact Database
Contact History
Contact Import/Export
Customer Pipeline
Email Marketing
Group Management
Interaction Tracking
Lead Management
Prospecting Tools
Sales Pipeline Management
Search / Filter
Segmentation
Shared Contacts
Social Media Integration
CRM
Calendar/Reminder System
Call Logging
Document Storage
Email Marketing
Internal Chat Integration
Lead Scoring
Marketing Automation Integration
Mobile Access
Quotes / Proposals
Segmentation
Social Media Integration
Task Management
Territory Management
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting