Best File Integrity Monitoring Software

Comparing 30 vendors in File Integrity Monitoring Software across 116 criteria.
    • SME
    • Oregon, US
    • Founded: 1997
    • $101MN to $500MN
    • 501 to 1,000
  • LogRhythm is among the leading security intelligence companies. The company offers a comprehensive portfolio of solutions such as SIEM, log management, and endpoint protection. It also provides its customers compliance and automation solutions. The company offers the FIM solution, which strengthens security and streamlines compliance by protecting critical files in organizations. It also provides alert on improper access of confidential files, malware-related registry changes, and theft of sensitive data. The solution constantly monitors all files and informs about modifications done to sensitive files.

    Read More
    • SME
    • Colorado, USA
    • Founded: 2003
    • $101MN to $500MN
    • 1,001 to 5,000
  • SolarWinds is among the leading global providers of IT management software to small businesses, MSPs, government agencies, and educational institutions. The company provides numerous products through various segments such as network management, system management, database management, IT security, IT help desk, and monitoring cloud. In addition, it provides its customers technical support and maintenance services. SolarWinds provides FIM with its Log and Event Manager, which protects user’s sensitive files and folders from unauthorized access and changes. The solution also monitors file activities to secure confidential information from malware, data breach, and loss. Thus, the solution helps organizations to comply with stringent regulatory compliances such as HIPAA, PCI DSS, SOX, ISO, FISMA, FERPA, NERC CIP, and GLBA

    Read More
    • SME
    • Austin, Texas, US
    • Founded: 1999
    • $101MN to $500MN
    • 1,001 to 5,000
  • AlienVault is among the leading global providers of advanced security solutions to SMEs and large enterprises. The company offers FIM through AlienVault Unified Security Management (USM), which also possess the capabilities of SIEM, behavioral monitoring, vulnerability assessment, flow and packet capture, Network and Host Intrusion Detection System (NIDS/HIDS), and asset discovery. The solution helps businesses to proactively tackle APTs and advanced vulnerabilities. The company aims to provide public and private organizations cutting-edge security solutions. Founded in 2007, with headquarters in California, US, AlienVault is among the leading global providers of advanced security solutions to SMEs and large enterprises. The company offers FIM through AlienVault Unified Security Management (USM), which also possess the capabilities of SIEM, behavioral monitoring, vulnerability assessment, flow and packet capture, Network and Host Intrusion Detection System (NIDS/HIDS), and asset discovery. The solution helps businesses to proactively tackle APTs and advanced vulnerabilities

    Read More
    • SME
    • 101 to 500
  • Trustwave is an information security company founded in 1995, with headquarters in Illinois, US. In August 2015, Singapore Telecommunications Limited (Singtel), Asia's leading communications group, acquired Trustwave Holdings, Inc. Trustwave, now a standalone business unit of the Singtel Group Enterprise, continues to operate under the Trustwave brand. The company provides network security, content security, data security, endpoint security, security management, database security, and application security solutions. The company offers FIM as a part of its Endpoint Protection Suite, which is a robust, cloud-based security solution that delivers integrated anti-malware, simplified compliance management, and policy enforcement. The solution includes modules for FIM, rogue device detection, log collection, and application whitelisting.

    Read More
    • SME
    • Illinois, USA
    • Founded: 1995
    • $101MN to $500MN
    • 1,001 to 5,000
  • Trend Micro is among the leading developers and sellers of hybrid cloud security, network defense, small business security, and endpoint security solutions. The company also provides services and technical support in the security market. The products protect critical assets and businesses from advanced threats such as ransomware, zero-day attacks, targeted attacks, and other vulnerabilities. It offers FIM through its Deep Security solution, which is a robust security platform for physical, virtual, and cloud servers. The FIM protection module detects modifications done in the file and Windows registry and indicates suspicious activities. The solution includes other integrated modules that include anti-malware, IPS, web reputation, firewall, and log inspection to help safeguard server, application, and data security across physical, virtual, and cloud infrastructures

    Read More
    • Enterprise
    • Tokyo, Japan
    • Founded: 1988
    • $1BN to $5BN
    • 5,001 to 10,000
    • Enterprise
    • 501 to 1,000
  • Netwrix offers FIM through Netwrix Auditor, a visibility platform for user behavior analysis and risk mitigation. The solution allows users to control the changes, configurations, and access in hybrid IT environments to protect data irrespective of its location. It also provides alerts to users in case of unauthorized activities in the files and folders. The deep visibility capability of its file integrity checking tools helps IT administrators to detect and mitigate suspicious activities that could lead to security breaches or business disruptions. In addition, it provides out-of-the-box compliance reports that enable users to pass audit checks with little effort.

    Read More
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • California, USA
    • Founded: 1987
    • $1BN to $5BN
    • 5,001 to 10,000
  • New Net is among the leading providers of real-time, intelligent, and context-based FIM, system configuration, vulnerability hardening, compliance management, and other solutions. The company provides real-time contextual FIM through its Change Tracker Generation 7, which uses both agent-based and agentless architectures. It scans devices in the organization and compares them to a standard policy, which can be user defined or based on an industry standard. It analyzes the configurable components in organizations and helps organizations to comply with regulatory compliances. The real-time, constant FIM detects changes made to any binary system or application file, or to any text-based configuration file, and delivers the reassurance that changes are malware free with its threat intelligence capabilities

    Read More
    • Enterprise
    • 501 to 1,000
  • ManageEngine provides real-time FIM through its EventLog Analyzer, which protects sensitive data in organizations and helps them in managing stringent regulatory compliances. The solution runs a 360°check on files and folders to determine if they are intact by scanning attributes such as contents, attributes, permissions, ownership, and size. On the occurrence of changes in any file or folder, the solution provides instant alert notifications. It monitors various types of files and folders such as executable files, folders, system configuration files, content files, zipped files, and zipped folders. Moreover, the solution provides an audit trail, which provides details about “what, when, where, and how” of all changes

    Read More
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • 501 to 1,000
    • SME
    • Redwood City, California, US
    • Founded: 1999
    • $101MN to $500MN
    • 501 to 1,000
    • Startup
    • Saint Paul, Minnesota, US
    • Founded: 1996
    • Below $10 MN
    • 51 to 100
    • SME
    • Arizona, USA
    • Founded: 1985
    • Below $10 MN
    • 1 to 50
    • Enterprise
    • 501 to 1,000
  • IONX is a well-renowned software company that includes developing, producing, and designing prepackaged computer software. Its file integrity monitoring software can detect all sorts of changes to system objects along with network device configuration. The file integrity monitoring software ensures proper monitoring and reporting of your systems to keep a record of your business. You can assure the safety of your order with the IONX file integrating the system.

    Read More
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • Holon, Israel
    • Founded: 2004
    • 101 to 500
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • 501 to 1,000
  • UPGUARD File Integrity Monitoring Software helps to reduce all sorts of cyber risks by preventing breaches and protects customer data from any external agent. Risking data of the company is equivalent to risking the future of the whole company, and UPGUARD helps in consolidating your firm. Now the control is accessible by the continuous monitor of traffic on your systems. For managing file integrity, UPGUARD provides the best of security and helps to monitor your vendors and gives you alerts against potential risks.

    Read More
    • Startup
    • Mountain View, California, US
    • Founded: 2012
    • Below $10 MN
    • 51 to 100
    • Startup
    • G-1/19 Shree Rani Sati Nagar Chs, S V Road Malad, Mumbai, India
    • Founded: 2009
    • Below $10 MN
    • 1 to 50
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • 501 to 1,000
    • SME
    • Bangalore, Karnataka, India
    • Founded: 2012
    • 1,001 to 5,000
    • Enterprise
    • Washington, US
    • Founded: 1996
    • $1BN to $5BN
    • 1,001 to 5,000
    • Enterprise
    • Texas, US
    • Founded: 1994
    • $500MN to $1BN
    • 1,001 to 5,000
    • Enterprise
    • Newbury, UK
    • Founded: 1976
    • $1BN to $5BN
    • 10,001 to 15,000
    • Enterprise
    • Washington, USA
    • Founded: 1975
    • More than $100 BN
    • 1,00,001 to 5,00,000
    • Enterprise
    • California, USA
    • Founded: 1977
    • $10BN to $50BN
    • 1,00,001 to 5,00,000

EVALUATION CRITERIA

Below criteria are most commonly used for comparing File Integrity Monitoring Software tools.
3.3
3.23
3.22
  • Breadth and Depth of Product Offerings

    • Differential Pricing and Features to Meet Customer Needs

    • Solutions Offered

      Agent Based | Agent Less |
    • Services Offered

      Professional Services | Managed Services |
    • government regulations

      PCI-DSS | HIPAA | NERC Standard CIP | SOX | CSA | SANA | SANS | DIACAP | FISMA |
    • Deployment Model

      On-Premise | Hosted / On-Cloud | Hybrid |
  • Product Features and Functionality

    • Product Updation

      security configuration management | log management | SIEM |
    • Product features

      Web application Servers, DNS Servers | Network Devices | Databases | Active Directories/DLAP | POS | Desktops | VMWare ESX/ESXi ConfigurationMonitoring |
    • Operating System supported

      Windows | Linux | Unix |
    • Features provided

      Functions / Applications | When a change was made | Who initiated the change | Status of the file before and after the change | View User & File Activity Holistically | Enriching Security Analytics portfolio of enterprises | Identifying Abnormal Behavior | Monitoring What change Matters | Alarm on Unauthorized Changes | Achieve Rapid Time-to-Value | Authorization protocols - Authorized access to a particular changes. |
  • Focus on Product Innovation

    • product enhancement

    • R&D Spend

    • New Product Developments

      Product Upgradation | New Product Launches |
  • Product Quality and Reliability

    • Scalability

    • services

      Technical Support | Customer Support | Sales Support | Other Support Services |
    • Channel for Delivery of Support Services

      On-Site Support | Remote Support |
  • Geographic Footprint

    • Direct Presence - North America

    • Direct Presence - Europe

    • Direct Presence - Asia-Pacific

    • Direct Presence - Middle East and Africa

    • Direct Presence - Latin America

    • Sales Office - North America

    • Sales Office - Europe

    • Sales Office - Asia-Pacific

    • Sales Office - Middle East and Africa

    • Sales Office - Latin America

    • Channel Partners - North America

    • Channel Partners - Europe

    • Channel Partners - Asia-Pacific

    • Channel Partners - Middle East and Africa

    • Channel Partners - Latin America

  • Breadth of Applications Served

    • Industry vertical

      Yes | No |
    • Business Strategies

    • End Users

      BFSI | Government | Healthcare & Lifesciences | Media and Entertainment | Retail & Ecommerce | Manufacturing & automotive | Education | Others (Utilities & Logistics and Telecom & IT, Travel & Tourism) |
  • Effectiveness of Organic Growth Strategy

    • Business Expansion Strategy

    • New Product Launched

      5 - 10 | 2 - 5 | < 2 | > 10 |
    • New Customers Acquired (Last 3 years)

      Customers 2 - 5 | Customers < 2 | Customers > 10 | Customers 5 - 10 |
  • Mergers and Acquisitions Strategy

    • Mergers & Acquisitions

    • Joint Ventures

    • partnerships & collaborations

  • Total Funding Amount

  • Revenue

  • Funding Status

TOP REVIEWS

Looking for File Integrity Monitoring Software? Get help
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#17 in File Integrity Monitoring Software

“Reduce risks"

(*)(*)(*)(*)(*)5
The IONX file integrating monitoring software reduces the risk using its centralized administration console. As it simplifies the distribution and management of agents and extensive data; and provides reports and centralized integrity checks.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#17 in File Integrity Monitoring Software

“Provide concise reports"

(*)(*)(*)(*)(*)5
The file integrating monitoring software stores details of all the unrecognized discrepancies. They are stored in a database from where they can be readily available for analysis, IT auditing, compliance, and searching.