Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
An integrated solution for automated discovery, documentation, password rotation, and diagram creation. Rely on us to handle site assessments. The Network Glue collector identifies every device on your clients' networks, regardless of the manufacturer. It also uncovers Active Directory setups, detailing the AD role for each workstation and server while seamlessly importing AD users from both on-premises and hybrid infrastructures. No more overlooked devices or missing user data. All network devices, alongside user information from Azure AD and Active Directory—be it cloud, hybrid, or on-premises—are systematically documented and refreshed in IT Glue. This also encompasses virtual network components for Hyper-V and VMware environments. Recognizing that not everyone has a knack for design, let Network Glue create intricate network diagrams on your behalf. With distinctive icons that facilitate quick understanding of network layouts, these diagrams are fully synchronized with IT Glue, ensuring that relevant information is readily accessible when a device icon is selected. Moreover, our solution significantly enhances operational efficiency, allowing IT teams to focus on other critical tasks while maintaining accurate network documentation.
Description
A robust central hub designed to enhance the efficiency of investigation and response workflows while facilitating rapid knowledge exchange among team members. This comprehensive framework features integration capabilities with various SIEM vendors, enabling the import and export of ticket details throughout the investigative process. It incorporates an investigation management system, playbook modeling functions, and enrichment technologies such as Sandbox tools, IP and host reputation analysis, geo-location services, and additional threat intelligence feeds. Contextual Capture™ offers leading global organizations a technological foundation for the collection and automatic analysis of network data pertinent to security investigations. By utilizing WireX Systems' Contextual Capture™ technology, organizations can overcome the restrictions associated with full packet capture, retain payload-level data for extended periods, and simplify the process of piecing together packets for thorough analysis. This innovative approach not only boosts operational effectiveness but also ensures that security teams can respond to threats more efficiently and with greater accuracy.
API Access
Has API
API Access
Has API
Integrations
Autotask PSA
Barracuda Managed XDR
BullPhish ID
ChatGenie
ConnectWise Cybersecurity Management
CrewHu
Datto Networking Appliance (DNA)
Domotz
HaloPSA
Kaseya BMS
Integrations
Autotask PSA
Barracuda Managed XDR
BullPhish ID
ChatGenie
ConnectWise Cybersecurity Management
CrewHu
Datto Networking Appliance (DNA)
Domotz
HaloPSA
Kaseya BMS
Pricing Details
$29 per month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
IT Glue
Country
United States
Website
www.itglue.com/networkglue/
Vendor Details
Company Name
WireX Systems
Country
United States
Website
wirexsystems.com
Product Features
Network Mapping
Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting
Product Features
Incident Response
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management