This is simple to learn an can help organization to maintain the security of their critical data. Review collected by and hosted on G2.com.
Command security gives the user a wide range of control. It can be problematic if the user does not full comprehend what she or he is doing. Review collected by and hosted on G2.com.
What I like the best in Powertech IBM is that it is easy to install and to learn without programming. It can also control and monitor the commands execution and meet the standards. Review collected by and hosted on G2.com.
What I most dislike is some of the commands are case sensitives that giving me hard time on the program successfull execution and it should meet compliance to prevent user from changing the data. Review collected by and hosted on G2.com.
Monitoring of commands and customize actions to prevent unauthorized use of a command that could cause major security issues. Review collected by and hosted on G2.com.
Administrators or need to set user profile that will have authority on the allowed commands be executed within the approved applications to make system related changes. Review collected by and hosted on G2.com.
Security and protection in the environment. It will help all the client/s (users/servers) to know the systems are advanced in secured technology. Review collected by and hosted on G2.com.
Command security gives user a flexible control. But if command will have been misuse, it will ruin some commands. Review collected by and hosted on G2.com.
They ensure to secure all the important data that really gives an assurance to user. Review collected by and hosted on G2.com.
I can't dislike this product. This is really cool Review collected by and hosted on G2.com.