Introducing G2.ai, the future of software buying.Try now
Powertech Exit Point Manager for IBM i
Show rating breakdown
Save to My Lists
Claimed
Claimed

Powertech Exit Point Manager for IBM i Reviews & Product Details

Powertech Exit Point Manager for IBM i Overview

What is Powertech Exit Point Manager for IBM i?

Meet HelpSysA Key Part of Fortra (the new face of HelpSystems) Powertech is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing complementary products together to solve problems in innovative ways. These integrated, scalable solutions address the fast-changing challenges you face in safeguarding your organization. With the help of the powerful protection from Powertech Exit Point Manager for IBM i and others, Fortra is your relentless ally, here for you every step of the way throughout your cybersecurity journey.

Powertech Exit Point Manager for IBM i Details
Show LessShow More
Product Description

Intrusion Prevention and Detection Software


Seller

Fortra

Description

Fortra’s advanced offensive and defensive security solutions cover the entire attack chain while most of the competition only covers one link, leaving opportunities for attackers to establish a foothold and then dwell inside your organization for months or even years to monitor, observe, and plot their next move. Fortra solutions go deep, designed and built to detect and prevent advanced attacks using real-time indicators of compromise and exclusive AI models that improve accuracy and automation. Fortra goes on the offensive too, offering software and services that follow the same pattern attackers use, so you can test, simulate and strengthen your defenses in real time. Fortra also generates original threat research and intelligence to protect our customers and contribute back to the cybersecurity community. We have nearly 400 globally recognized experts specializing in both offensive and defensive security. We also collaborate with threat intelligence partners — including global law enforcement agencies, ISACs, and other public and private sector organizations — to disrupt malicious actors and their infrastructure.

Overview Provided by:

Recent Powertech Exit Point Manager for IBM i Reviews

TH
Tran Thi H.Enterprise (> 1000 emp.)
4.0 out of 5
"General standard data monitoring"
Powertech Exit Point Manager (EPM) has been a reliable application utility to be used in managing data access on our system. The platform is real-...

Powertech Exit Point Manager for IBM i Media

Answer a few questions to help the Powertech Exit Point Manager for IBM i community
Have you used Powertech Exit Point Manager for IBM i before?
Yes

1 Powertech Exit Point Manager for IBM i Reviews

4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
TH
Credit Analyst
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Powertech Exit Point Manager for IBM i?

Powertech Exit Point Manager (EPM) has been a reliable application utility to be used in managing data access on our system. The platform is real-time in terms of reporting on any activity of the user and controls the transfer of data at the attempt level. Review collected by and hosted on G2.com.

What do you dislike about Powertech Exit Point Manager for IBM i?

It appears that Powertech EPM has little visibility concerning encrypted traffic. It is incapable of interpreting the content of encrypted data packets; this has made it difficult for me to identify other forms of security risks that might be concealed in the packets. Review collected by and hosted on G2.com.

What problems is Powertech Exit Point Manager for IBM i solving and how is that benefiting you?

Powertech EPM puts IBM i administrators in charge of data security by monitoring access and implementing fine-grained controls. What makes this platform stand out compared to other solutions is that it provides full visibility into user activity and attempts to transfer data. Review collected by and hosted on G2.com.

There are not enough reviews of Powertech Exit Point Manager for IBM i for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(186)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
2
Palo Alto Networks Next-Generation Firewalls Logo
Palo Alto Networks Next-Generation Firewalls
4.5
(147)
Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.
3
Blumira Automated Detection & Response Logo
Blumira Automated Detection & Response
4.6
(117)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
4
AlienVault USM (from AT&T Cybersecurity) Logo
AlienVault USM (from AT&T Cybersecurity)
4.4
(113)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
5
Cloud-Delivered Security Services Logo
Cloud-Delivered Security Services
4.4
(103)
Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-of-a-kind protection uses the network effect of 65,000 global customers to share intelligence from all threat vectors to stop known, unknown and zero-day threats 180X faster than any other platform or point solution.
6
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Logo
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)
4.2
(92)
The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security that is both agile and integrated- leading to the strongest security posture available today and tomorrow. From your data center, branch offices, cloud environments, and everywhere in between, you can leverage the power of Cisco to turn your existing network infrastructure into an extension of your firewall solution, resulting in world class security controls everywhere you need them. Investing in a Secure Firewall appliance today gives you robust protections against even the most sophisticated threats without compromising performance when inspecting encrypted traffic. Further, integrations with other Cisco and 3rd party solutions provides you with a broad and deep portfolio of security products, all working together to correlate previously disconnected events, eliminate noise, and stop threats faster.
7
CrowdSec Logo
CrowdSec
4.7
(87)
CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countries across 6 continents, the solution builds a real-time IP reputation database that keeps growing every day and benefits all community members who have each other's backs while forming a global defense shield.
8
Palo Alto Networks VM-Series Virtual Firewall Logo
Palo Alto Networks VM-Series Virtual Firewall
4.3
(74)
Palo Alto Networks VM-Series Virtual Firewall is a cloud security software that allows businesses to prevent data loss and threats with this virtualized firewall for private and public cloud environments. VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Cisco, Citrix, KVM, OpenStack, Amazon Web Services, Microsoft and Google.
9
ExtraHop Logo
ExtraHop
4.6
(67)
ExtraHop Reveal(x) provides cloud-native visibility, detection, and response for the hybrid enterprise.
10
Trellix Network Detection and Response (NDR) Logo
Trellix Network Detection and Response (NDR)
4.1
(66)
FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection.
Show More