Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Multi-Domain Security Management enhances security and oversight by dividing security management into various virtual domains. Organizations, regardless of their size, can effortlessly establish virtual domains tailored to geographic locations, business units, or specific security functions, thereby bolstering security and streamlining management processes. This approach facilitates detailed and distinct role-based administration within a multi-tenant security management framework. A unified security management setup governs VPNs, firewalls, intrusion prevention systems, and other protective measures. Administrators can create, monitor, and regulate all network security management domains through a single interface. Additionally, it allows for the centralized management of numerous administrators within the multi-domain security management framework. Administrators can be granted permissions to oversee particular domains or various facets of the multi-domain system, enabling multiple administrators to collaborate across different security management domains simultaneously. This collaborative environment ensures that security measures are effectively maintained and adapted to the evolving needs of the organization.

Description

Network Configuration Manager (NCM) is a multi-vendor solution for network configuration management (NCCM), which can be used to manage switches, routers, firewalls, and other devices. NCM automates and takes complete control of the entire device configuration management life cycle. You can schedule device configuration backups, track user activities, spot changes, and compare configuration versions all from one central web GUI. You can monitor configuration changes, receive instant notifications, and prevent unauthorized modifications to keep your network environment safe, stable, and compliant. Standard practices and policies should be established. Device configurations should be checked for violations. Then, you can quickly apply corrective measures to ensure compliance. Automate repetitive, time-consuming configuration management tasks. Also, centrally apply configuration changes to devices.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Aruba ClearPass
CrowdStrike Falcon
CyberArk Conjur
Cyberint Argos Platform
Equinix
Google Digital Risk Protection
IBM Cloud
IBM MaaS360
Ivanti Neurons for MDM
Medigate
Okta
Siemplify
SolarWinds Access Rights Manager
Swimlane
Trustwave
Tufin
iPass

Integrations

Aruba ClearPass
CrowdStrike Falcon
CyberArk Conjur
Cyberint Argos Platform
Equinix
Google Digital Risk Protection
IBM Cloud
IBM MaaS360
Ivanti Neurons for MDM
Medigate
Okta
Siemplify
SolarWinds Access Rights Manager
Swimlane
Trustwave
Tufin
iPass

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$238
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Check Point

Founded

1993

Country

United States

Website

www.checkpoint.com/quantum/multi-domain-security-management/

Vendor Details

Company Name

ManageEngine

Founded

1996

Country

India

Website

www.manageengine.com/network-configuration-manager/

Product Features

Backup

Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Network Automation

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
Junos Security Director Reviews

Junos Security Director

Juniper Networks
FortiPortal Reviews

FortiPortal

Fortinet