![icon arrow](images/iconero.png)
- Advanced Configuration
- Advanced Monitoring and Alerting
- Antivirus
- App Delivery & Patching
- Application & Service Catalog
- Application Control
- Apps, Browsers, & Java Security
- Auditing Devices & Drives
- Change Auditing
- Cloud Detection and Response for M365
- Cloud Detection and Response for Public Cloud
- Data Classification
- Data Detection
- Data Filtering
- Data Tagging
- Desktop Automation & Connectivity
- Device Control
- Encryption of Full Disks
- Encryption of Removable Media
- GPO Compliance
- GPO Reductions & Transitions
- Hardware and Software Inventory for Windows
- Identity Threat Detection and Response (IDR) for Azure AD
- Inbound Email Security
- Integration Services
- Layer 2 Visualization
- Least Privilege Management
- Managed Detection and Response (MDR)
- Monitoring Logs, Servers, Virtualization and Applications
- Monitoring Platform
- Network Detection and Response (NDR)
- Network Profiles
- Outbound Email Security
- Password Manager
- Password Policy Enforcer
- Port Control
- Privileged Account Management
- Shadowing
- SNMP & Core Monitoring
- Traffic Flow Analyzer
- Windows 10 & 11 Management
Currently 41 Themes. Make your choice below.
![Identity Threat Detection and Response (IDR) for Azure AD](media/product_images/thumb/th_78_84Vectra_doosje.png)
Identity Threat Detection and
Response (IDR) for Azure AD
It let you know when your Azure AD accounts have been compromised. Arm your SOC analysts to see and stop identity-based attacks in
![Inbound Email Security](media/product_images/thumb/th_78_84Abnormal_doosje.png)
Inbound Email Security
It PREVENTS: it blocks targeted inbound email attacks including credential phishing, business email compromise, supply chain frau
![Integration Services](media/product_images/thumb/th_78_84netcrunch.png)
Integration Services
Let NetCrunch integrate with various third-party services such as help desk and other productivity tools. The module also allows y
![Layer 2 Visualization](media/product_images/thumb/th_78_84netcrunch.png)
Layer 2 Visualization
Layer 2 Topology Mapping. NetCrunch discovers and presents physical connections between switches and nodes on automatic layer 2 to
![Least Privilege Management](media/product_images/thumb/th_78_84netwrix-productbox-website_v2.png)
Least Privilege Management
Manages local admin rights plus blocks ransomware and adds in remotework assistance. Removes local admin rights without impacting
![Managed Detection and Response (MDR)](media/product_images/thumb/th_78_84Vectra_doosje.png)
Managed Detection and Response (MDR)
24x7x365 Managed detection, investigation and response. You will team up with skilled Vectra AI analysts to defend your hybrid and
![Monitoring Logs, Servers, Virtualization and Applications](media/product_images/thumb/th_78_84netcrunch.png)
Monitoring Logs, Servers,
Virtualization and Applications
Add monitoring of operating systems and applications running on Windows, Mac OS X, Solaris, Linux, and BSD. Monitor ESXi hyperviso
![Monitoring Platform](media/product_images/thumb/th_78_84netcrunch.png)
Monitoring Platform
Regardless of what you need to monitor, you need a solid foundation such as event processing, data logic, storage and the presenta
![Network Detection and Response (NDR)](media/product_images/thumb/th_78_84Vectra_doosje.png)
Network Detection and Response (NDR)
It let you find attackers hiding in your hybrid network and let you see and stop unknown attacks in minutes You will know when y
![Network Profiles](media/product_images/thumb/th_78_84drivelock-productbox-website.png)
Network Profiles
DriveLock immediately recognizes when the computer is connected to a different network and applies the settings you configured for
![Outbound Email Security](media/product_images/thumb/th_78_84Product-image-EasyDMARC.png)
Outbound Email Security
EasyDMARC helps: against misuse of your domain for spoofing and phishing; with your interpretation of DMARC reports;to increase th