Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Sentry File provides a seamless solution for combining physical and digital documents within an online filing system. This platform encompasses all essential tools required by modern digital workplaces, all conveniently packaged in a web-based format. Users can swiftly build a comprehensive digital archive of crucial business documents. Paper documents can be easily incorporated using various compatible scanning methods, such as Twain, Scan-To-Email, Scan-To-FTP, or Scan-To-Folder. Additionally, users can upload a wide array of electronic files, including Microsoft Office formats, audio, video, and nearly any other type of file. The management process is streamlined by an incredibly user-friendly graphical interface. The Professional and Small Business Editions are particularly well-suited for small to midsize enterprises that need an economical way to safeguard important paper documents. Furthermore, the highly adaptable Sentry File Corporate and Enterprise Editions cater to large organizations that require an effective and straightforward approach to disseminate documentation both locally and globally, ensuring that all team members have access to essential information. With its versatile features, Sentry File is designed to meet the diverse needs of businesses of all sizes.
Description
Don't worry about unaddressed vulnerabilities, insider threats, or emerging attack methods. ThreatSentry integrates a cutting-edge Web Application Firewall along with a port-level firewall and advanced behavioral filtering to effectively block undesirable IIS traffic and threats targeting web applications. Providing enterprise-level, multi-layered security and compliance (like PCI DSS) for Microsoft IIS (versions 5/6/7/8/10) at an affordable price for small businesses, ThreatSentry is implemented as a native module within IIS7 to 10, or as an ISAPI extension or filter for IIS 6 and IIS 5, and is accessible via a Snap-in to the Microsoft Management Console (MMC). Extremely user-friendly, ThreatSentry is specifically designed to safeguard against network vulnerabilities that arise from patch management failures, configuration mistakes, and the adoption of novel attack strategies. Don’t miss out on a complimentary evaluation session of ThreatSentry today! Our team will provide personalized assistance with installation and configuration to ensure you get the most out of your security solution. Click here to book your session now!
API Access
Has API
API Access
Has API
Integrations
PSIcapture
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$649.00
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
CutCom Software
Website
www.sentryfile.com
Vendor Details
Company Name
Privacyware
Website
www.privacyware.com/threatsentry.html
Product Features
Document Management
Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning