Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

OpenText Core EDR serves as a comprehensive solution for endpoint detection and response, merging endpoint protection, security information and event management (SIEM), security orchestration, automation, and response (SOAR), alert triage, and vulnerability assessment into a singular platform, thereby removing the necessity of juggling multiple security tools. Its lightweight agent, equipped with pre-configured policies, allows for swift deployment within minutes and simplifies management across various devices without the need for intricate scripting. By effectively correlating events from endpoints, networks, and identities in real time, the integrated SIEM and SOAR playbooks highlight suspicious activities and automatically direct actions for containment, remediation, and investigation. The system is fortified with continuous, global threat intelligence that facilitates real-time monitoring, which is crucial for detecting malware, ransomware, zero-day vulnerabilities, and other sophisticated threats before they can proliferate, allowing for the prompt isolation or remediation of affected endpoints. This capability not only enhances security but also empowers organizations to respond proactively to emerging threats and maintain a resilient cybersecurity posture.

Description

Keep a close watch on your IBM i for vital security incidents and get instant notifications, enabling you to act swiftly—before essential business data is lost, damaged, or compromised. Directly relay security-related incidents to your enterprise security monitor for enhanced oversight. By integrating with your security information and event management (SIEM) system, Powertech SIEM Agent streamlines and consolidates monitoring of security and integrity. You can oversee security events from the network, operating system, and any journal or message queue in real-time, tracking user profile alterations, system value changes, unauthorized login attempts, intrusion alerts, and modifications or deletions of objects. Stay informed about every security event on your system in real-time, ensuring you never overlook a potential security threat. With Powertech SIEM Agent for IBM i, you will receive timely alerts to highlight critical issues and facilitate a rapid response. This comprehensive monitoring approach not only enhances your security posture but also helps maintain the integrity of your business operations.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

IBM Tivoli Monitoring
IBM i
LogRhythm SIEM
OpenText Enterprise Security Manager
Splunk Enterprise

Integrations

IBM Tivoli Monitoring
IBM i
LogRhythm SIEM
OpenText Enterprise Security Manager
Splunk Enterprise

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

OpenText

Founded

1991

Country

Canada

Website

cybersecurity.opentext.com/products/threat-detection/endpoint-detection-response/

Vendor Details

Company Name

Fortra

Country

United States

Website

www.fortra.com/products/security-and-integrity-monitoring-software-ibm-i

Product Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Product Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Alternatives

ZeroHack SIEM Reviews

ZeroHack SIEM

WhizHack
PURVEYOR Reviews

PURVEYOR

COUNTERVEIL
TeskaLabs SIEM Reviews

TeskaLabs SIEM

TeskaLabs