Allows use of the VPN on multiple connections at the same time.
Protocol Choices
Enables the user to choose which protocol to use such as OpenVPN or PPTP.
Unlimited Bandwidth
Provides unlimited bandwidth for the user.
No Log Storage
Does not keep logs of user activity.
Varied Server Locations
Provides servers in many different locations.
Unlimited Server Switches
Enables you to switch between servers an unlimited number of times.
Miscellaneous (3)
Live Customer Support
Provides live customer support.
Open Source Code
Enables the user to view the code used by the VPN.
Multiple Payment Methods
Allows multiple payment methods such as credit card or cryptocurrency.
Network Management (3)
Activity Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Log Management
Provides security information and stores the data in a secure repository for reference.
Incident Management (3)
Event Management
Alerts users of incidents and allows users to intervene manually or triggers an automated response.
Automated Response
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reporting
Documents cases of abnormal activity and compromised systems.
Security Intelligence (4)
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Vulnerability Assessment
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Advanced Analytics
Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.
Data Examination
Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.
Administration (3)
Change Management
Tools to track and implement required IT changes in a system.
Asset Management
Tools to organize and manage all IT assets within an organization.
Reports & Analytics
A means to view and analyze a large amount of data in order to gain business insights.
Service Desk (3)
Help Desk
Based on 10 Command|Link reviews.
A place for users to submit tickets when they require IT help.
Incident Reports
Reports based on IT incidents so IT members can prioritize high risk issues and maintain a record of problems and how often they occur.
Process Workflow
The ability to create flowcharts and other means to outline specific processes to ensure that all requirements are met.
Functionality (4)
Ticketing System
10 reviewers of Command|Link have provided feedback on this feature.
Provides a service desk for users to submit tickets for IT-related issues.
Performance Logging
Tracks action-by-action asset performance with machine- or human-readable logs.
Alerting
11 reviewers of Command|Link have provided feedback on this feature.
Creates alerts when tracked assets encounter errors or performance issues.
Automation
Automates repetitive tasks associated with IT service operations and maintenance.
Management (8)
Reporting
Provides graphics, dashboards, and general reporting around IT service, assets, and incidents.
Administration Console
Provides administrative tools for routine maintenance, upkeep, and tracking.
Access Management
Gives administrators control over user privileges and accessibility for IT assets.
Asset Management
Gives administrators control over hardware and software resource allocation and tracking.
Policy Dictation
Controls policies and configurations across business applications and hardware.
Extensibility
Allows for customized support for hybrid environments
Workflow Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Unified Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Analysis (4)
Incident Reporting
Produces reports detailing trends and vulnerabilities related to their network and infrastructur
Network Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Metadata Enrichment
Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Metadata Management
Indexes metadata descriptions for easier searching and enhanced insight
Response (3)
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Response Orchestration
Integrates additional security tools to automate security and incident response processes.
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly
Detection (3)
Multi-Network Monitoring
Provides monitoring capabilities for multiple networks at once.
Asset Discovery
Detect new assets as they enter a network and add them to asset inventory.
Anomaly Detection
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns
Detection & Response (4)
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Threat Hunting
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Rule-Based Detection
Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance.
Real-Time Detection
Constantly monitors system to detect anomalies in real time.
Analytics (3)
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Artificial Intelligence & Machine Learning
Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Data Collection
Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
Platform Features (7)
24/7 support
Provides 24/7 support to customers with technical questions.
Proactive report alerts
Proactively sends reports or alerts to customers.
Application control
Lets users detect and block applications that are not a security threat.
Proactive threat hunting
Proactively hunts threats.
Rapid response time
Provides rapid reponse time to cyber threats.
Customizeable reports
Provides the ability to customize reports.
Managed Services
Offers MDR as a service.
Automation Capabilities (3)
Automated remediation
Ability to automatically neutralize or eliminate active vulnerabilities.
Automated investigation
Ability to automatically investigate networks and endpoints for threats.
AI Agents
Utilizes AI agents for detection and response tasks.
Components - Secure Access Service Edge (SASE) (5)
Zero Trust Network Access (ZTNA)
Enforces zero trust access rules.
Wide Area Network (WAN)
Integrates wide area network (WAN) capabilities, such as SD-WAN.
Cloud Access Security Broker (CASB)
Enforces security requirements and secures connections with cloud resources.
Secure Web Gateway (SWG)
Prevents unauthorized web domains from entering a network and protects against web-based threats.
Firewall as a Service
Provides cloud-based firewall protection.
Artificial Intelligence - Secure Access Service Edge (SASE) (3)
Predictive Capabilities
Uses predictive analytics to anticipate emerging threats.
Real-Time Threat Detection
Utilizes AI algorithms to identify anomolies and block access to malicious sites.
Automation
Automates common workflows and remediation tasks.
Agentic AI - Security Information and Event Management (SIEM) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Extended Detection and Response (XDR) Platforms (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Secure Access Service Edge (SASE) Platforms (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - IT Service Management (ITSM) Tools (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Services - Network Detection and Response (NDR) (1)
Managed Services
Offers managed network detection and response services.
Services - Extended Detection and Response (XDR) (1)
Managed Services
Offers managed detection and response services.
Components - Secure Service Edge (SSE) (4)
Secure Web Gateway (SWG)
Prevents unauthorized web domains from entering a network and protects against web-based threats.
Firewall as a Service
Provides cloud-based firewall protection.
Zero Trust Network Access (ZTNA)
Enforces zero trust access rules.
Cloud Access Security Broker (CASB)
Enforces security requirements and secures connections with cloud resources.
Artificial Intelligence -Secure Service Edge (SSE) (3)
Automation
Automates common workflows and remediation tasks.
Predictive Capabilities
Uses predictive analytics to anticipate emerging threats.
Real-Time Threat Detection
Utilizes AI algorithms to identify anomolies and block access to malicious sites.
Agentic AI - Secure Service Edge (SSE) (4)
Decision Making
Makes informed choices based on available data and objectives.
Autonomous Task Execution
Capability to perform complex tasks without constant human input.
Cross-system Integration
Works across multiple software systems or databases.
Proactive Assistance
Anticipates needs and offers suggestions without prompting.
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.