Netwrix Auditor for Network Devices
Netwrix Auditor for Network Devices provides security intelligence that enables you to quickly detect and investigate threats to your perimeter security, such as unauthorized changes to configurations, suspicious logon attempts and scanning threats. It also provides detailed information about hardware malfunctions and remote access to your network.
- Configuration change auditing
Unlike native network audit tools, automates auditing of configuration changes by providing clear, human-readable audit information on configuration changes with who, what, when and where details, so you can quickly spot and remediate unauthorized changes or change errors.
- Remote access monitoring
Monitors successful and failed VPN logon attempts to network devices, as well as remote access to the corporate network. Enables you to track device logons by network administrators and remote access by users from suspicious IP addresses.
- Logon auditing
Delivers clear information about each attempt to log in directly to a network device. Enables you to pay close attention to failed logons, especially those performed by unauthorized employees, such as database or system administrators.
- Scanning threat reporting
Enables automated network auditing for scanning threats, which indicate an intruder trying to identify weak spots in your network to breach it. Delivers detailed information about which subnet or host was attacked, and when and from which IP address it happened.
- Hardware malfunction reporting
Makes continuous hardware audit easy by reporting on hardware issues in network devices in an easy-to-understand format. Provides device data so you can detect technical issues with network devices before they lead to network traffic issues.
- Alerts on critical events
Provides alerting on device configuration changes that could negatively affect your network configuration, abnormal logon events, scanning threats and hardware issues, simplifying the detection of critical events and helping you resolve issues faster.
- Interactive search
Makes it easy to investigate unauthorized configuration changes and suspicious logon events to prevent similar events from happening in the future, and to troubleshoot hardware issues before they lead to network failures.
- Compliance reporting
Helps organizations ensure that they have compliant networks and provide definitive proof of their compliance during audits by providing predefined reports for PCI DSS, HIPAA, SOX, GLBA, FISMA/NIST, CJIS, GDPR and other regulations.
- Unified platform
Delivers visibility into Active Directory, Oracle Database, Windows Server, Office 365 and other on-premises and cloud-based systems. Brings more context to your SIEM data and enables centralized monitoring of any other application with a RESTful API.
GFI LanGuard provides a full cycle of network management including network scanning, patching and auditing in order to defend customers against tens of thousands vulnerabilities. Security audits check for over 60,000 vulnerability assessments using an extensive, industrial strength vulnerabilities database incorporating OVAL (11,500+ checks) and SANS Top 20 standards. Innovative agent technology allows the scanning and remediation load to be distributed across machines. Particularly useful in enterprise networks.
Lansweeper’s network inventory tool allows for a global network inventory and IT inventory asset management. Lansweeper is praised as the best network inventory scanner due to the unique agentless network inventory capabilities which provides unmatched details about hardware, software, users, network, warranty and much more. Network device inventory gives you a full overview of all switches, printers, routers, firewalls, music systems, IP cameras and any other network device in your network.
Metasploit is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. Metasploit increases penetration testers’ productivity, validates vulnerabilities, enables phishing and broader social engineering, and improves security awareness. Metasploit gives you insight that’s backed by a community of well over 200,000 users and contributors: It’s the most impactful penetration testing solution on the planet.