Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
EZ-Audit serves as a high-end audit application utilized by numerous auditors across many of the globe's largest insurance firms, while also being adopted by smaller fee companies. The software's adaptability allows it to meet the varying requirements of organizations of all sizes. Particularly beneficial for novice auditors, EZ-Audit organizes all essential audit data entry screens in a straightforward, sequential manner. Additionally, it possesses the robust capabilities required for conducting extensive audits involving multiple entities, states, locations, and auditors, offering immediate access to any relevant audit information. InsuraTek, LLC stands out as a premier developer of software tailored for the insurance sector, leveraging cutting-edge Microsoft technologies, including Visual Studio 2019, and ensuring support for SQL Server versions ranging from 2005 to 2019 to meet client needs. Since its inception in 1984, when it launched the first premium audit application designed for portable computers, the company has continuously delivered outstanding software solutions for the insurance industry. This commitment to innovation and quality has solidified InsuraTek's reputation as a trusted partner for insurance professionals.
Description
Nsauditor Network Security Auditor is an effective tool designed for evaluating network security by scanning both networks and individual hosts to identify vulnerabilities and issue security warnings. This network security auditing software serves as a comprehensive vulnerability scanner that assesses an organization's network for various potential attack vectors that could be exploited by hackers, producing detailed reports on any identified issues. By utilizing Nsauditor, businesses can significantly lower their overall network management expenses, as it allows IT staff and system administrators to collect extensive information from all networked computers without the need for server-side software installations. Additionally, the ability to generate thorough reports not only aids in identifying security weaknesses but also streamlines the process of addressing these vulnerabilities systematically.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$69 one-time payment
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
InsuraTek
Website
insuratek.com/ez-audit/
Vendor Details
Company Name
Nsasoft
Website
www.nsauditor.com
Product Features
Insurance Agency
Claims Management
Commission Management
Contact Management
Document Management
Insurance Rating
Life & Health
Policy Management
Property & Casualty
Quote Management
Insurance Policy
Cancellation Tracking
Claims Tracking
Policy Generation
Policy Issuance
Policy Processing
Quotes / Estimates
Rating Engine
Reinstatement Tracking
Reinsurance Administration
Renewal Management
Underwriting Management
Insurance Underwriting and Rating
Broker / Agent Portal
Carrier Upload
Commercial Lines
Comparative Insurance Rating
Customer Portal
For Casualty Insurance
For Health / Medical Insurance
For Life Insurance
For Personal Insurance
Multi-State
Multiple Line Rating
Product Features
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection