Who Uses This Software?
Organizations of all sizes and industries rely on Powertech Event Manager to take their threat detection and response to the next level.
Average Ratings
1 Review-
Overall
-
Ease of Use
-
Customer Service
Product Details
-
Starting PriceNot provided by vendor
-
Free TrialYes , get a free trial
-
DeploymentCloud, SaaS, Web
Installed - Windows
-
TrainingDocumentation
Webinars
Live Online
-
SupportOnline
Business Hours
24/7 (Live Rep)
Vendor Details
- HelpSystems
- www.helpsystems.com/product-lines/powertech
- Founded 1982
- United States
About Powertech Event Manager
Powertech Event Manager is a cybersecurity insight and response platform that ensures critical events get the attention they require. Events are translated into an easy-to-interpret format, and critical events are separated from the noise in real time. This enables security analysts to act quickly and decisively, even without specialized knowledge of every technology in your environment. A full audit trail makes it easy to meet compliance requirements.

Powertech Event Manager Features
- Archiving
- Audit Trails
- Compliance Reporting
- Consolidation
- Data Visualization
- Event Logs
- Network Logs
- Remediation
- Syslogs
- Thresholds
- Web Logs

Useful add-on for security to IBMi system
Mar 28, 2018
Bruce K.

Director of IT Operations & Global Web Acquisition
1001-5000 employees
Used the software for: 6-12 months
Reviewer Source
Source: Capterra
Ease of Use
Features & Functionality
Customer Support
Value for Money
Likelihood to Recommend:
Not
Likely Extremely
Likely

Likely Extremely
Likely
Pros: It runs on the IBMi platform & provides an additional layer of security & control beyond what IBM provides with the OS. Training provided was excellent.
Cons: It takes a lot of time to set up, to monitor, & then regularly watch it. It's green-screen based --- so it's not a modern interface. Takes quite a bit of time to learn it where it becomes 2nd nature. I'm not sure that we are using it fully up to its potential.
Overall: We were able to implement exit point security on our IBMi system, which we did not have before. This protects parts of the IBMi that are not well protected by the basic OS of the system. It provides useful tracking information. too.