Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Proxy Networks offers both hosted and on-premise remote support solutions tailored for IT departments and help desks. With our software, you can securely perform remote desktop operations and troubleshoot a variety of devices, including PCs, servers, and mobile devices. Our robust encryption, authentication, and privileged access management features empower customers to set their own security protocols and flexible remote access policies. Designed for ease of use and budget-friendly, PROXY Pro can accommodate the most intricate remote desktop management requirements. We deliver remote access software compatible with all platforms, including virtual machines and Thin Clients, ensuring accessibility regardless of the user's operating system. Utilize our PROXY Deployment Tool to manage host settings at any time, allowing for personalized configurations for remote access, or take advantage of our web-based Host on Demand (HOD) for seamless clientless remote connections. The versatility of Proxy Networks' software means that IT professionals can respond instantly and securely to support requests across any system or endpoint, enhancing overall efficiency in remote assistance. Embrace the future of remote support with our innovative solutions that cater to various organizational needs.
Description
Identify, prioritize, and address both internal and external security vulnerabilities effectively. Strengthen the networks under your supervision and safeguard them against emerging threats with the advanced vulnerability scanning capabilities offered by VulScan.
VulScan stands out as a robust solution for automated and thorough vulnerability assessments. It identifies and ranks the vulnerabilities that could be targeted by cybercriminals, enabling you to reinforce networks of any configuration and adding an essential layer of cybersecurity defense.
Ensure the safety of your managed networks with versatile scanning options provided by VulScan. The platform features on-premises internal network scanners, software-based discovery agents, remote internal scanning through proxies, and externally hosted scanners, delivering a comprehensive approach to vulnerability management that meets the diverse needs of any organization. With VulScan, you can maintain a proactive stance against potential security threats.
API Access
Has API
API Access
Has API
Integrations
MyGlue
Network Glue
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$99 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
PROXY Networks
Founded
2006
Country
United States
Website
www.proxynetworks.com
Vendor Details
Company Name
RapidFire Tools, a Kaseya Company
Founded
2011
Country
United States
Website
www.rapidfiretools.com/products/vulnerability-management/
Product Features
Help Desk
Alerts / Escalation
Automated Routing
Community Forums
Customizable Branding
Document Storage
Email Integration
IT Asset Management
Incident Management
Interaction Tracking
Knowledge Base
Known Issue Management
Live Chat
Multi-Channel Communication
Multiple Brands / Products
Network Monitoring
Real-time Chat
Self Service Portal
Service Level Agreement (SLA) Management
Ticket Management
ITSM
Asset Tracking
Availability Management
Change Management
Configuration Management
Contract/License Management
Dashboard
Incident Management
Problem Management
Project Management
Release & Deployment Management
Self Service Portal
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection