Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Stay updated with comprehensive software and hardware inventories, ensure software license compliance, and receive critical alerts about asset status; with PrefixNE, you maintain complete oversight of your network. This innovative tool automates various daily tasks and allows for remote execution of an extensive array of functions, such as software deployment, powering off computers, and performing restarts, all of which enhance efficiency and increase IT productivity. You can manage devices like memory sticks, PDAs, and MP3 players connected to your network, effectively safeguarding against malware threats and data breaches without the need for a complete USB port lockdown. PrefixNE stands out as the most budget-friendly, all-encompassing solution available for IT professionals today. By integrating all essential features required to secure and manage network assets into a single user-friendly application, PrefixNE not only saves you valuable time but also significantly enhances overall productivity, all while remaining highly cost-effective. With its powerful capabilities, PrefixNE is the smart choice for any organization looking to streamline their IT operations.
Description
Pwn Pulse Sensor ensures complete visibility of devices by establishing a foundational security profile and implementing essential network controls throughout various physical locations. It offers a straightforward deployment process that does not require the installation or management of agents. The sensor enables real-time identification of all IT and IoT devices—regardless of whether they are wired, wireless, or using Bluetooth—both within the network and the adjacent airspace. It automatically generates detailed device fingerprints that include details such as the manufacturer, operating system, ports, running services, and both IP and MAC addresses. Additionally, it correlates interfaces, analyzes data snapshots, and assesses device relationships to formulate unique device identities, which aids in monitoring their behavior and any subsequent changes over time. This comprehensive monitoring capability enhances overall network security and facilitates proactive responses to potential threats.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
$394.94 one-time payment
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Prefix IT
Country
United Kingdom
Website
www.prefixit.com
Vendor Details
Company Name
Outpost24
Founded
2001
Country
Sweden
Website
outpost24.com/products/wireless-security/pulse
Product Features
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
License Management
Automatic SKU Recognition
Central LM Server
Copy Protection
History Tracking
Node Management
Online Activation
Portable License
Sarbanes-Oxley Compliance
Timing Rights
Trial License
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Product Features
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning