Infiltration Systems

Infiltration Systems

Infiltration Systems offers advanced network monitoring and security solutions, including user activity tracking and comprehensive auditing tools.

Location: United States
Software Type: Web App
Categories:

Need help?

We can help you find specialists for Infiltration Systems. Let us connect you with the right experts to assist you.

*User registration required

Are you an expert in Infiltration Systems?

Description

Infiltration Systems provides a suite of applications for effective network monitoring and security. The primary applications include NetAware and Infiltrator.

NetAware features a robust user monitoring system that tracks user activities on shared files. It logs file access, allowing administrators to see which files are being used and by whom. The solution includes real-time alert features that can notify users via email or pop-up notifications during specific file share activities. Additionally, it offers an intuitive user interface for easy log viewing and export options in HTML format. Administrators can also manage shares effectively, including the ability to lock or unlock shares, ensuring tight control over file access.

Infiltrator is a free, user-friendly network security scanner designed to audit networked computers swiftly. It catalogues comprehensive information about each scanned computer, revealing details such as installed software, shared resources, user accounts, and more. Infiltrator also performs security policy audits, providing alerts to users when password or security policy changes are necessary. The results from these audits can be compiled into professional reports for review. Moreover, Infiltrator includes over 15 powerful network utilities, such as Ping Sweep, Whois Lookups, and brute-force cracking tools, enabling thorough network security assessments.

Together, these applications provide a complete solution for monitoring user activities and enhancing network security, helping organizations maintain control and oversight of their information systems.

Features

User Monitoring

Track user activity on shared files, including access logs and connection status.

File Access Logging

Log and review which files users access in real time.

Real-Time Alerts

Receive notifications for specific file share activities via email or pop-ups.

Intuitive User Interface

A user-friendly interface for easy log viewing and HTML export.

Share Management System

Create, remove, and manage shared resources efficiently.

Network Security Scanner

Audit networked computers for security vulnerabilities.

Report Generation

Compile audit results into easy-to-read, professional reports.

Comprehensive Network Utilities

Includes tools such as Ping Sweep, Whois Lookup, and email tracing for security assessments.

Tags

network monitoringsecurity auditsuser activity trackingfile management

Documentation & Support

  • Documentation
  • Support
  • Updates