Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

OpenText Core DNS Protection delivers continuous, comprehensive oversight of DNS traffic to defend organizations against stealthy, fast-moving attacks. It inspects every DNS resolution request—from applications, browsers, and background processes—and immediately filters out malicious queries before harm can occur. The solution helps prevent data loss by blocking communication with Command and Control infrastructure used for exfiltration and ransomware operations. With dynamic detection of unauthorized DNS servers, it ensures that encrypted DNS traffic cannot bypass corporate policies. Administrators can centrally manage rules, analyze DNS patterns, and identify vulnerabilities through built-in reporting dashboards. Hybrid and remote workers stay fully protected because the agent enforces DNS policies on any network. Setup is fast and frictionless, giving organizations instant security improvements without major infrastructure changes. By restoring full visibility and control over DNS activity, the platform strengthens the security posture of modern, distributed environments.

Description

Are you seeking an effective solution to oversee, manage, and regulate activities on personal computers, thin clients, and various mobile devices from one central hub? Our top-tier cybersecurity software is designed to accomplish just that and much more. Pearl Echo.Suite is a comprehensive Internet management tool that can be utilized in diverse domains such as email communication, web browsing, file transfers, access to news resources, and instant messaging through platforms like Skype. This versatile software is tailored to meet the requirements of your organization, whether you operate from a single site or multiple locations, and is also adept at tracking mobile and roaming Internet users. In environments that utilize peer-to-peer, server-centric, and client-server computing, you can establish user-specific policies to monitor Internet usage and control access across your entire network. By implementing Pearl Echo.Suite's web monitoring capabilities, administrators gain the ability to filter and supervise a wide range of activities, including email correspondence, instant messaging, chatting, news access, file transfers, and general web surfing, ensuring a secure and efficient online environment. With its robust features, Pearl Echo.Suite empowers organizations to maintain control over their digital landscape effectively.

API Access

Has API

API Access

Has API

Screenshots View All

No images available

Screenshots View All

Integrations

A10 Defend DDoS Mitigator
AWS Marketplace
BrightGauge
DatAnswers
Pulseway
SQL Server
ThreatAware

Integrations

A10 Defend DDoS Mitigator
AWS Marketplace
BrightGauge
DatAnswers
Pulseway
SQL Server
ThreatAware

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

OpenText

Founded

1991

Country

Canada

Website

cybersecurity.opentext.com/products/threat-detection/dns-protection/

Vendor Details

Company Name

Pearl Software

Founded

1996

Country

United States

Website

www.pearlsoftware.com/products/pearlEcho/index.html

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Web Content Filtering

Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting

Product Features

Web Content Filtering

Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting

Alternatives

Alternatives

TimeClock Pearl Reviews

TimeClock Pearl

Affinity Systems
SpamTitan Reviews

SpamTitan

TitanHQ
WFilter Enterprise Reviews

WFilter Enterprise

IMFirewall Software
WebTitan Reviews

WebTitan

TitanHQ