Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Powertech Policy Minder is a security management solution designed for IBM i that streamlines essential tasks and generates thorough security compliance reports. By automating the security management processes, Policy Minder significantly reduces the time needed and removes the burdensome manual efforts typically involved in managing security details. In addition to offering a traditional green screen interface, Policy Minder boasts a user-friendly graphical user interface (GUI). This tool makes it effortless to establish your security policy for IBM i, allowing for customization tailored to your organization's specific needs or the option to utilize a template that adheres to established cybersecurity best practices. The process of assessing your security policy against the current system configuration is straightforward and automated. Furthermore, you can arrange for policy checks to occur automatically on a schedule. The FixIt feature identifies settings that do not meet compliance standards and rectifies them automatically, ensuring your system remains secure. With these features, organizations can enhance their security posture while minimizing administrative overhead.

Description

Automate network configuration management, compliance, and save time. This can help optimize IT resources and reduce costs. Automated network configuration management and backup can reduce costs, save time, and help you stay compliant. Don't worry about whether your inventory lists and spreadsheets are reliable, accurate, current, and reliable. SolarWinds®, Network Configuration Manager (NCM) allows you to quickly create an accurate inventory of all your network devices. You can use network scanning and discovery for up-to-date information about all network devices. It is crucial to compare network configurations quickly and accurately for a variety of reasons. One example is to verify against security policies to ensure there aren't any discrepancies between saved and running configurations. Another example is to quickly identify and correct any unauthorized or failed modifications. Automating network configuration management makes it easier to schedule regular backups.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Datto Workplace
IBM i
SolarWinds Engineer's Toolset
SolarWinds NetFlow Traffic Analyzer
SolarWinds Network Performance Monitor (NPM)
SolarWinds Web Help Desk

Integrations

Datto Workplace
IBM i
SolarWinds Engineer's Toolset
SolarWinds NetFlow Traffic Analyzer
SolarWinds Network Performance Monitor (NPM)
SolarWinds Web Help Desk

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$2,995 one-time fee
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Fortra

Founded

1982

Country

United States

Website

www.fortra.com/products/security-policy-management-software-ibm-i

Vendor Details

Company Name

SolarWinds

Founded

2000

Country

United States

Website

www.solarwinds.com/network-configuration-manager

Product Features

Audit

Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management

Policy Management

Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management

Product Features

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Network Automation

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Alternatives

TotalCompliance Reviews

TotalCompliance

ComplianceBridge

Alternatives

Unimus Reviews

Unimus

NetCore j.s.a. (Unimus)
Auvik Reviews

Auvik

Auvik Networks
Security Auditor Reviews

Security Auditor

Core Security (Fortra)
NetBrain Reviews

NetBrain

NetBrain Technologies