+
+

Related Products

  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website
  • PowerDMARC
    244 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,231 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    191 Ratings
    Visit Website

About

In use by thousands of security professionals across industries and governments, Celerium solutions are changing the way we manage cyber threats. As a community, we need to sift through the quagmire of data to find relevant intelligence. We need to use that intelligence proactively to defend our networks and organizations and make our communities safer. And we need to help each other prioritize the volume of activity to understand the hierarchy of threat actors. With Celerium’s Cyber Defense Network, private and public organizations are proactive about cyber defense, faster to respond to threats and smarter about their response. In order to defend against threats, we must first know what's important. Together we can identify important threats, automate our reaction to those threats and proactively keep our networks and industries safer. Celerium provides a variety of solutions that empower our customers to take a proactive, aggressive stance on cyber security.

About

Netwrix Change Tracker provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Netwrix Change Tracker will ensure that your IT systems remain in a known, secure and compliant state at all times. Netwrix Change Tracker includes context-based File Integrity Monitoring and File Whitelisting to assure all change activity is automatically analyzed and validated. Complete and certified CIS and DISA STIG configuration hardening ensures all systems remain securely configured at all times and, coupled with the most intelligent change control technology, provides unparalleled change noise reduction along with the ultimate reassurance that the changes occurring within your production environment are consistent, safe and as required.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Security professionals looking for a solution to protect their infrastructure against data breaches and cyber threats

Audience

Companies that want to achieve IT security and compliance

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

No images available

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Celerium
Founded: 2019
United States
www.celerium.com/solutions

Company Information

Netwrix
Founded: 2006
United States
www.netwrix.com/security_configuration_management_software.html

Alternatives

Alternatives

Tripwire

Tripwire

Fortra

Categories

Categories

Compliance Features

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Integrations

Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Netwrix Auditor
Sophos Firewall
pfSense

Integrations

Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Netwrix Auditor
Sophos Firewall
pfSense
Claim Celerium and update features and information
Claim Celerium and update features and information
Claim Netwrix Change Tracker and update features and information
Claim Netwrix Change Tracker and update features and information