Infiltration Systems
Infiltration Systems offers advanced network monitoring and security solutions, including user activity tracking and comprehensive auditing tools.
Need help?
We can help you find specialists for Infiltration Systems. Let us connect you with the right experts to assist you.
*User registration required
Description
Infiltration Systems provides a suite of applications for effective network monitoring and security. The primary applications include NetAware and Infiltrator.
NetAware features a robust user monitoring system that tracks user activities on shared files. It logs file access, allowing administrators to see which files are being used and by whom. The solution includes real-time alert features that can notify users via email or pop-up notifications during specific file share activities. Additionally, it offers an intuitive user interface for easy log viewing and export options in HTML format. Administrators can also manage shares effectively, including the ability to lock or unlock shares, ensuring tight control over file access.
Infiltrator is a free, user-friendly network security scanner designed to audit networked computers swiftly. It catalogues comprehensive information about each scanned computer, revealing details such as installed software, shared resources, user accounts, and more. Infiltrator also performs security policy audits, providing alerts to users when password or security policy changes are necessary. The results from these audits can be compiled into professional reports for review. Moreover, Infiltrator includes over 15 powerful network utilities, such as Ping Sweep, Whois Lookups, and brute-force cracking tools, enabling thorough network security assessments.
Together, these applications provide a complete solution for monitoring user activities and enhancing network security, helping organizations maintain control and oversight of their information systems.
Features
User Monitoring
Track user activity on shared files, including access logs and connection status.
File Access Logging
Log and review which files users access in real time.
Real-Time Alerts
Receive notifications for specific file share activities via email or pop-ups.
Intuitive User Interface
A user-friendly interface for easy log viewing and HTML export.
Share Management System
Create, remove, and manage shared resources efficiently.
Network Security Scanner
Audit networked computers for security vulnerabilities.
Report Generation
Compile audit results into easy-to-read, professional reports.
Comprehensive Network Utilities
Includes tools such as Ping Sweep, Whois Lookup, and email tracing for security assessments.
Tags
Documentation & Support
- Documentation
- Support
- Updates