Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
With ServerInternals, users have immediate access to all critical information, facilitating swift diagnostics that lead directly to identifying the underlying issues and implementing appropriate solutions. There's no longer a necessity to utilize Performance Monitor and ponder which counter values to gather, nor to check Services for failures, or to delve into Event Viewer and create intricate filters to sift through extraneous data. Additionally, connecting to the server to examine CPU usage, memory consumption, and running processes via Task Manager is rendered unnecessary. The integration of performance metrics, event logs, service statuses, and process details, paired with intuitive drill-down navigation, ensures a streamlined and effective root-cause analysis of any issues that arise. If needed, corrective measures can be executed straight from the ServerInternals interface. The use of color-coded status indicators, gauges, charts, and lists allows for a comprehensive presentation of a wide array of information, enhancing user experience and operational efficiency. This holistic approach not only saves time but also empowers users to manage server performance proactively.
Description
Smokescreen specializes in deception technology and active defense, offering a solution that envelops your network with decoys designed to ensnare hackers. By experiencing a demonstration of our product, IllusionBLACK, you will gain insights into adversarial tactics while witnessing how strategically placed decoys across your network enable precise threat detections at every juncture. The system is user-friendly and covers various environments including Perimeter, Cloud, internal networks, endpoints, and Active Directory. You can effortlessly initiate your first deception campaign using pre-configured decoys, allowing you to prioritize threat detection without the burden of extensive setup time. Any engagement with an IllusionBLACK decoy serves as a reliable signal of a potential breach, ensuring that alerts you receive are indeed significant. Moreover, our platform simplifies automated forensics and root-cause analysis, enabling you to achieve results quickly with a leaner team. With seamless integrations available for SIEMs, Firewalls, EDRs, Proxy, threat intelligence feeds, SOAR, and much more, you can enhance your cybersecurity posture efficiently. This comprehensive approach not only streamlines your defense strategy but also empowers your organization to respond effectively to emerging threats.
API Access
Has API
API Access
Has API
Integrations
Carbon Black EDR
Cisco ACI
CrowdStrike Falcon
HALO Inventory Management
IBM Cloud
OpenText Enterprise Security Manager
Palo Alto Networks Next-Generation Firewalls
Splunk Cloud Platform
Integrations
Carbon Black EDR
Cisco ACI
CrowdStrike Falcon
HALO Inventory Management
IBM Cloud
OpenText Enterprise Security Manager
Palo Alto Networks Next-Generation Firewalls
Splunk Cloud Platform
Pricing Details
$65.00/one-time/user
Free Trial
Free Version
Pricing Details
$7,750 per year
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Hazelnut Software
Founded
2011
Country
United Kingdom
Website
www.serverinternals.co.uk
Vendor Details
Company Name
Smokescreen
Founded
2015
Country
United States
Website
www.smokescreen.io
Product Features
Server Management
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning