Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Shadow CMS Enterprise call accounting is adept at identifying operational bottlenecks, flagging unusual activity, reconciling billing statements, aiding in migration planning, and managing telecom expenditures. Many businesses encounter challenges related to workforce management and overall productivity. Shadow All-In-One features an extensive array of real-time and historical reports and dashboards that reveal service levels, call volume, departmental performance, and call center analytics. Additionally, Shadow can integrate communication metrics from various IP/PBX systems, communication servers, and collaboration tools into comprehensive reports for in-depth analysis of patterns, trends, KPIs, and workforce optimization. The data is meticulously organized and displayed in customizable dashboards, reports, or as actionable events triggered by specific criteria. Shadow provides multiple modules that offer personalized dashboards and metrics tailored for real-time settings such as call centers, healthcare facilities, and critical operations centers. Users can access this information from desktops, wall displays, or it can be distributed directly to teams for immediate insights and decision-making. Enhanced visibility into communication metrics allows organizations to make informed choices to improve efficiency and drive performance.
Description
Organizations are increasingly adopting advanced deception-based active defense solutions due to their low-risk nature and their ability to mitigate false positives commonly found in other methods. Acalvio's ShadowPlex has been designed to redefine standards for mitigating advanced persistent threats (APTs), ransomware, and malware by centralizing the entire process. The decoys, which include fake hosts or honeypots, are strategically placed across the enterprise network from a single location, making them appear as legitimate local assets. Additionally, the complexity of a decoy can be adjusted in real-time based on the actions of an attacker, enhancing the effectiveness of the deception. This innovative approach to resource management enables ShadowPlex to provide both extensive scale and a high level of decoy realism, making it a powerful tool for organizations. Furthermore, the system streamlines the configuration and deployment of deception tools through automation. By integrating predefined playbooks with an AI-driven recommendation engine, ShadowPlex can autonomously generate and position the right deception objects where they are needed most. This not only enhances security but also reduces the burden on IT teams, allowing them to focus on more critical tasks.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Cisco Identity Services Engine (ISE)
Cortex XSOAR
IBM QRadar SIEM
Microsoft Entra ID Protection
NetWitness
OpenText Enterprise Security Manager
Securonix Unified Defense SIEM
Splunk Cloud Platform
Integrations
Active Directory
Cisco Identity Services Engine (ISE)
Cortex XSOAR
IBM QRadar SIEM
Microsoft Entra ID Protection
NetWitness
OpenText Enterprise Security Manager
Securonix Unified Defense SIEM
Splunk Cloud Platform
Pricing Details
$1000 one-time payment
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Resource Software International
Founded
1990
Country
Canada
Website
www.telecost.com/rsi-products.php#SHADOWCMS
Vendor Details
Company Name
Acalvio Technologies
Country
United States
Website
www.acalvio.com/product/
Product Features
Call Accounting
By-Extension Reporting
Call Duration
Call Monitoring
Call Volume
Caller Identification
Inbound Reporting
Outbound Reporting
Unattended Call Management
Who Answered Log
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting