Dark Web ID

Dark Web ID

IDAgent, a Kaseya company
+
+

Related Products

  • Guardz
    56 Ratings
    Visit Website
  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    374 Ratings
    Visit Website
  • Syncro
    412 Ratings
    Visit Website
  • SpamTitan
    813 Ratings
    Visit Website
  • Wiz
    1,052 Ratings
    Visit Website
  • Keeper Security
    1,625 Ratings
    Visit Website
  • Netwrix Auditor
    296 Ratings
    Visit Website
  • ConnectWise SIEM
    188 Ratings
    Visit Website
  • NinjaOne
    3,047 Ratings
    Visit Website

About

Get More Sales. Streamline Your Costs. Differentiate Your MSP. ID Agent helps your MSP sell your security stack to new and current customers by empowering you with real-time dark web search results (creating urgency), complete with sales & marketing-ready resources and coaching, so you can see profits within 30 days or less. Your Customers are often only concerned about their network passwords being exposed and are not really thinking about the breached 3rd party websites and applications that store their usernames and passwords. With three former CEOs of MSPs on staff, more Managed Service Providers globally rely on ID Agent than any other monitoring software to provide actionable cybersecurity threat intelligence. We have (literally) been in your shoes before, know what challenges and objections you face, and how to overcome them.

About

NTFS permissions are used to manage access to the files and folders in NTFS file systems. NTFS Permissions Auditor allows you to quickly analyze, verify and review any NTFS folder permissions. Our free version provides you with deep and detailed audit results while the Pro version offers additional features such as powerful, customizable filtering, exports to various formats, and more. Select or import directories you want to audit, or search for other shares and add them to the audit settings. Configure additional audit settings if required or simply leave the default settings on. Press ‘Audit’ and wait for all folders and their NTFS permissions to be scanned. When the audit results are ready, you can view or export them to a file. Get up and running with just one installation – no other configuration is needed. The filters incorporate lots of factors – use ‘And’ and ‘Or’ to manage them and get the information you need.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

MSPs

Audience

Companies seeking a tool offering audit directory permissions in Windows systems quickly

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$300 per month
Free Version
Free Trial

Pricing

$199 one-time payment
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

IDAgent, a Kaseya company
Founded: 2016
United States
www.idagent.com

Company Information

Albus Bit
Founded: 2017
Latvia
albusbit.com/NTFSPermissionsAuditor.php

Alternatives

Alternatives

CPTRAX for Windows

CPTRAX for Windows

Visual Click Software
Trend Vision One

Trend Vision One

Trend Micro
Alert Logic

Alert Logic

Fortra
Specops Password Auditor

Specops Password Auditor

Specops Software

Categories

Categories

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Discovery Features

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Email Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

MSP Features

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

Autotask PSA
MyGlue
Network Glue
ThreatAware

Integrations

Autotask PSA
MyGlue
Network Glue
ThreatAware
Claim Dark Web ID and update features and information
Claim Dark Web ID and update features and information
Claim NTFS Permissions Auditor and update features and information
Claim NTFS Permissions Auditor and update features and information