DefendX Control Description

Secure corporate files and control storage resources. You can think of us as the camera in your office supply room. Your files and storage assets are being exposed to theft, loss, and misuse by those who are responsible for maintaining them. These threats can lead to revenue loss and increase risk. It is your responsibility to identify it and stop it. Storage consumption can be managed using both hard and soft user limits. Advanced file blocking policies can be used to prevent unwanted files from getting into your environment. Policy governance is maintained through thorough discovery, real-time alerts and automated quarantine/removal actions. Audit trails provide extensive evidence that can be used to support legal holds and investigations. You can protect yourself against theft and other malicious activities by monitoring user behavior and file activity.

Pricing

Pricing Starts At:
$8000 one-time fee
Free Trial:
Yes

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
DefendX Software
Year Founded:
1994
Headquarters:
United States
Website:
defendx.com/defendx-control/

Media

DefendX Control Screenshot 1
Recommended Products
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
Windows
Type of Training
Documentation
Live Online
Webinars
In Person
Customer Support
24/7 Live Support

DefendX Control Features and Options

Risk Management Software

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Data Security Software

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance