UBM Global

Register/Password

  • French
  • English
  • Dutch
Home Icon arrow Products Icon Arrow Netwrix Auditor for Network Devices
Netwrix Auditor for Network Devices
Netwrix Auditor for Network Devices
Simplify monitoring of network devices with network audit software
Manufacturer : Netwrix
Infrastructure: Cisco, Fortinet, Palo Alto, SonicWall, Juniper
Why try & buy?

It helps you to continuously audit network devices to stay on top of network security threats and improve business continuity. To ensure network security, prove compliance and improve network reliability, you need to implement continuous network audits. As part of this network monitoring, you have to regularly monitor network devices for configuration changes and logon attempts that could be non-compliant with internal security policies; detect scanning threats before attackers can take control of the entire network infrastructure; and monitor device information about hardware issues to prevent network failure. The capabilities available in Netwrix Auditor for Network Devices empower you to continuously monitor your network devices, detect threats to your perimeter security and improve overall data security in your organization.

Product description:

Netwrix Auditor for Network Devices delivers complete visibility into Cisco, Fortinet, Palo Alto, SonicWall and Juniper device configuration changes, and both successful and failed attempts to log on to switches, routers and firewalls. This network audit software also enables network audit for scanning threats and reports on hardware issues, enabling organizations to respond to these events before they breach network security or disrupt network performance.


Change Auditing (1st of 1 themes)

What can it do for you?

Netwrix Auditor for Network Devices provides security intelligence that enables you to quickly detect and investigate threats to your perimeter security, such as unauthorized changes to configurations, suspicious logon attempts and scanning threats. It also provides detailed information about hardware malfunctions and remote access to your network.


Features:

 

Configuration change auditing

Unlike native network audit tools, automates auditing of configuration changes by providing clear, human-readable audit information on configuration changes with who, what, when and where details, so you can quickly spot and remediate unauthorized changes or change errors.

 

Remote access monitoring

Monitors successful and failed VPN logon attempts to network devices, as well as remote access to the corporate network. Enables you to track device logons by network administrators and remote access by users from suspicious IP addresses.

 

Logon auditing

Delivers clear information about each attempt to log in directly to a network device. Enables you to pay close attention to failed logons, especially those performed by unauthorized employees, such as database or system administrators.

 

Scanning threat reporting

Enables automated network auditing for scanning threats, which indicate an intruder trying to identify weak spots in your network to breach it. Delivers detailed information about which subnet or host was attacked, and when and from which IP address it happened.

 

Hardware malfunction reporting

Makes continuous hardware audit easy by reporting on hardware issues in network devices in an easy-to-understand format. Provides device data so you can detect technical issues with network devices before they lead to network traffic issues.

 

Alerts on critical events

Provides alerting on device configuration changes that could negatively affect your network configuration, abnormal logon events, scanning threats and hardware issues, simplifying the detection of critical events and helping you resolve issues faster.

Contact | Privacy Policy | Disclaimer | © 2020 UBM Global | Site Design: Tomworks.nl