Functions at a glance
- Monitoring of workstations, servers, network and mobile devices in one dashboard
- Fully integrated patch management
- Integrated security solutions (SentinelOne, Bitdefender)
- Comprehensive automation options (scripts, SNMP, WMI)
- Remote access via take control
- Network Topology Mapping
- Detailed reporting thanks to the Report Manager
- On Premise or Cloud version available
- Administration for WIN, Linux and Mac
Functions at a glance
- Monitoring of workstations, servers, network and mobile devices in one dashboard
- Fully integrated patch management
- Integrated security solutions (SentinelOne, Bitdefender)
- Comprehensive automation options (scripts, SNMP, WMI)
- Remote access via take control
- Visualization of network paths
- Detailed reports
- Administration for WIN, Linux and Mac
Functions at a glance
- Swiss data center
- Server, Workstation and VM Backups
- Backup for Office 365, SQL, Oracle and more
- Bare Metal Restore
- virtual disaster recovery
- Automated test backups and recovery testing
- Bandwidth Management
- Archiving backups
Functions at a glance
- Increased efficiency by managing all customers in the central dashboard
- Increased IT security through strong passwords & automated password change
- Quick access to all information needed for customer support
- Reduced resolution time thanks to standardized IT documentation and integrated password management
- Maintaining consistent service delivery
- Fulfilment of customer compliance requirements
- DSGVO-compliant backup in the cloud
- Complete transparency through comprehensive reporting
Function at a glance
- Near real-time file analysis: The system can continuously analyze files, eliminating the need for time-consuming periodic scans.
- Forensics: View an overview of the threat and the course of an attack to quickly understand the threat.
- No signatures required: Combat the latest threats without having to wait for daily definition updates.
- Offline protection: AI data is stored in the endpoint so that it is protected offline. In addition, if you want to perform reputation checks, you no longer need to wait for signature updates or a connection between endpoint and cloud.
- Machine Learning: The system uses machine learning to determine the most appropriate responses to threats and adjusts these responses over time.
- Independent actions: Deploy policy-based endpoint protection to automatically neutralize threats at the endpoint.
