Related Products
|
||||||
About
The industry’s simplest and most flexible guest access solution. In today’s mobile era, wireless access is no longer a service, it’s an expectation. But the challenge of offering convenience without sacrificing security has long vexed IT staff. After years of working closely with our clients, we listened to their needs and developed a robust and fully featured guest access. Whether via self-registration or sponsored access, JoinNow NetAuth streamlines the process for delivering scalable guest wireless, enabling institutions of all sizes to deliver the most flexible, robust turn-key solution for both encrypted and unencrypted guest networks.
|
About
The LobbyWorks Visitor Management Suite enhances your investment in access control and perimeter security by providing a simple and effective way to register, badge, and track visitors. It allows you to generate detailed visitor traffic reports and enforce visitor/contractor security policies. Power and flexibility make LobbyWorks a natural fit for small single-site deployments using the Express Edition or regional WAN-based network deployments using the Premier Edition. System offerings allow you to tailor your visitor management system to meet your needs best. Visitor registration is quick and simple and can be performed at a guard station or using an optional self-registration kiosk. LobbyWorks scans the photo ID or business card of an arriving visitor, then instantly checks whether the visitor is expected or has been in the facility before and makes sure the visitor is not on a watch list.
|
About
Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments. Security hardening and monitoring for private cloud and physical data centers with support for Docker containers. Agentless Docker container protection with full application control and integrated management. Block zero-day exploits with application whitelisting, granular intrusion prevention, and real-time file integrity monitoring (RT-FIM). Secure OpenStack deployments with full hardening of Keystone identity service module. Data center security: monitoring. Continuous security monitoring of private cloud and physical on-premises data center environments. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Organizations interested in a solution that helps automate permissions and policies
|
Audience
Enterprises and security operators in search of a solution to manage and ensure access control and perimeter security
|
Audience
IT security professionals interested in omplete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationJoinNow
www.securew2.com/products/joinnow-netauth-server
|
Company InformationHoneywell
United States
www.security.honeywell.com/product-repository/lobbyworks-vms
|
Company InformationBroadcom
Founded: 1991
United States
www.broadcom.com/products/cybersecurity/endpoint/hybrid-cloud/data-center-security
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
||||||
|
|
|||||
|
|
|
||||
|
|
|||||
Categories |
Categories |
Categories |
||||
Data Center Management Features
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance
|
||||||
Integrations
CA Auditor for z/OS
EnCase Forensic
FortiSandbox
HP-UX
HPE OpenVMS
Microsoft Entra ID
NorthStar Navigator
OctoXLabs
|
Integrations
CA Auditor for z/OS
EnCase Forensic
FortiSandbox
HP-UX
HPE OpenVMS
Microsoft Entra ID
NorthStar Navigator
OctoXLabs
|
Integrations
CA Auditor for z/OS
EnCase Forensic
FortiSandbox
HP-UX
HPE OpenVMS
Microsoft Entra ID
NorthStar Navigator
OctoXLabs
|
||||
|
|
|