Likelihood to Recommend This is pretty good AV product - lightweight, easy to install, and easy on system resources. It will take some getting used to on the end user side, it doesn't scan in a traditional way, and it does not have a taskbar icon so it hard to know if it's working or installed. My only complaint would be the false positives which I know every AV system has, but the problem with Barkly is that it alerts the users with a message (which they freak out about) and it alerts IT with an email. Again, not a major issue, but it can be annoying until it is overridden. The override process is super easy though, so its again, not a big deal.
Read full review As specified earlier, the product is very helpful to monitor the FTP, ODBC, JDBC, SQL and remote commands. What queries are coming to the system and who is issuing the commands so that we can analyze the and restrict their access if its not required. It helped us catch [a lot of] unauthorized users.
Read full review Pros Customer Service. Usually, I'd put the technical details up front, and they're good with that too. But the service from pre-sales all the way through onboarding and continued account management is top tier. Our onboarding schedule got messed up, partly because of us, but that was rather minor. I always get prompt replies to any tickets, and they've even reached out to discuss my feature requests. When it comes to security, it's critical to have a responsive team, and they've got it. Detection seems good. It's hard to quantify exactly, but it seems that they always detect the bad actors. And when we get an alert, they include a bunch of details so we know what kind of scan they're trying to do, how far they got, etc. You can't prevent everyone from doing a scan on your IP, but it gives you a really good idea of where your soft spots might be. And if you're getting those low-level alerts, it's a reminder that it's there and working if you have a major event too. Very easy setup. This goes back to their customer support to some extent, as they walk you through all the steps required. But it's also about their technical solution, it's not so overly complex that it's fragile, nor does it take a great deal of time to deploy. And it's been zero effort to maintain since then. Read full review Restricted FTP users ODBC/JDBC connection restrictions Exit Point Security Performance, Flexibility Read full review Cons The interface is a little lacking from a search perspective but its not really meant for us to have to do the work Read full review Adding a user to the exit point manger and then specifying the same user to restrict for particular service is bit complex i feel, instead of that making only one entry to restriction would be good. All Features are good Can maintain all systems from central system. Read full review Alternatives Considered I was using Alert Logic Insight for myself to improve my skills and ability to it. My organization was not happy using our previous website security program so I recommended for them to use this software. It has been more than 1 year and still, they are using this program without having any problem so far.
Read full review Helpsystems was one of the best leading third-party service provider in the Market for
IBM i . Since we are already customer for the Helpsystems and their support is awesome. We need the best products in market and Helpsystems has all the good tools that suits to my environment. All we need is the best support when its required which Helpsystems support team doing at its best.
is
be identical or equivalent to
More (Definitions, Synonyms, Translation)
Read full review Return on Investment Return on Investment is measured in how protected our reputation is and Alert Logic contributes to this is a large way. Alert Logic provides excellent information security assurance to the business and allows us to feel more proactive. Read full review Controlling of unauthorized access Monitoring the exit point manger logs to restrict data access only to authorized people. Monitor of FTP, ODBC, SQL, Remote Commands and block attacks on IBM i DB2 Read full review ScreenShots