Desktop Fax and Broadcast Fax softwareBuy Now Download
Fax server software designed for network-wide transmission and receipt of fax messages, as well as sending and forwarding fax messages by email. Fax software for Windows and Unix with full support for terminal server environments that integrates with other applications to send fully automated faxes and emails. Fax software with free tech support and two years of free updates!
Automatic routing of received fax messages with extension numbers (DDI, MSN, DID), station id (CSID) and line routing. Fax and email from UNIX and Linux through LPD/LPR, FTP, TFTP and RAW-TCP-Port connections as well as import from the file system. Ability to Fax and email from any Windows application through native printer driver. Learn more...
Bandwidth Traffic Monitoring and AnalysisBuy Now Download
Analyze, diagnose, monitor, and manage the bandwidth from your computers, servers, printers and other devices, local and remote. Learn where bottlenecks occur. Monitor bandwidth thru SNMP protocol, WMI and remote agents. Collects information about inbound and outbound traffic and displays the dynamic of the changing transferring speed in a map.
DBM can perform specific actions from sending the SMS and email to rebooting the computer and service if critical values of volume were reached.
Monitor and respond when critical values of speed and traffic volume are exceeded. Variety of diagrams, reports and statistics local and remote. Discover who is causing bandwidth problems. Learn more...
Network Mapping, Monitoring, DiagrammingBuy Now Download
Map, Monitor, Scan your entire network, find hosts, place them on a diagram, and monitor their state. Built-in web server for remote access to monitoring stats. Quickly build network diagrams and maps, save or print them and manage all your remote devices quickly and easily, with DNA's visual network map. Monitor and diagram your operations 24/7.
You can shut down, restart, and turn on servers and workstations, access remote services, view remote event logs, access the registry, both local and remote. Export data to a graphic image, Microsoft Visio, or XML scheme. Monitor ICMP, TCP port, monitor ARP and MAC address, SNMP, FTP, HTTP, NetBios, file size and disk space monitoring. Learn more...
Software and Hardware Asset ManagementBuy Now Download
Software and hardware inventory with detailed reports of the software and hardware installed on your computer network. Export your valuable data to a variety of different databases such as MS SQL, MS Access, Postgre, and Linter. View remote computers' hardware and software. Be notified about hardware and software changes via a screen message, sound, or e-mail.
Learn which computers, local and remote, need more RAM, an upgrade to the operating system, a larger disk drive, or a software update. Audit your License Keys and Serial Numbers. Track changes on all your computers. Comes with more than 50 different reports and the ability to customize your own reports. Now with Linux support. Learn more...
Network Device Monitoring and AlertingBuy Now Download
Network monitor that alerts you to all problems that occur via an email message, sound file, SMS message to your cellphone, or event log file. Be notified when a device is available and when it becomes unavailable or out of service, local and remote. Avoid costly downtime. Periodically polls devices and sends them an ICMP packet and tries to connect to the requested TCP Port.
If the check is successful the color green will be displayed and if the check you ran failed the color red will be displayed. DNM stores the results of all the monitoring checks that you run and it monitors computers, servers, switches and several other devices. It monitors databases, services, files, folders, processes, free space on disks, and much more! Learn more...
USB Security, Port Locking, and Access ControlBuy Now Download
Prevent unauthorized USB devices from being connected to your computers. Disable and lock your USB ports and secure your data. Offers password protection and encryption. Protects against lost or stolen data, as well as viruses and malware infections. Operates completely in the background, and is undetectable to computer users.
There are no pop-up windows and warning messages unless you require them. Running without being visible, DEKSI USB Security logs all attempts to connect authorized and disallowed USB devices, allowing administrators to perform comprehensive audits of DEKSI USB Security whenever they want to check to make sure their computer operations are secure. Learn more...