Top 15 XIA Configuration Server Alternative and Similar Softwares | May 2024

XIA Configuration Server is a network documentation tool that automatically inventories, documents and audits the servers and devices within an organisation.

It includes support for Microsoft Windows, Unix and Linux based Servers and Workstations, AD, Exchange, Clusters, IIS, SQL, DNS, DHCP, Hyper-V, VMWare, Network Switches, Citrix, Backup Exec and more.

The configuration of all these different technologies is collated and displayed in a single, unified web interface.

1. SecReport

SecReport SecReport is an essential file system security reporting solution that allows IT and InfoSec professionals to gain an unprecedented level of control over the overgrowing file system access lists, including the ability to track changes, prepare for information security audits and investigate security incidents in a rapid and efficient manner.SecReport......

2. S4NITY

S4NITY Product overviewS4NITY is a managed logging and reporting solution for IT infrastructure and security components that will assist in achieving and maintaining PCI compliance. The service is designed to be easy to deploy and easy to use for all levels of the IT organisation.Features and benefitsManaged solution for logging and......

3. VisualCodeGrepper

VisualCodeGrepper VCG is an automated code security review tool that handles C/C++, Java, C#, VB and PL/SQL. It has a few features that should hopefully make it useful to anyone conducting code security reviews, particularly where time is at a premium:1. In addition to performing some more complex checks it also......

4. Infer

Infer Facebook Infer is a static analysis tool - if you give Infer some Objective-C, Java, or C code, it produces a list of potential bugs.......

5. LepideAuditor Suite

LepideAuditor Suite LepideAuditor Suite - A change auditing software for Active Directory, GPO and Exchange Server. It facilitates admins to keep check altogether on all the changes happening on Active Directory, GPO and Exchange Server from a centralized location. If administrators do not want audit all changes on Windows Server then they......

6. NetWrix Auditor

NetWrix Auditor Configuration Auditing of IT InfrastructureNetwrix disruptively changes the way configuration auditing is done, exclusively focuses on this #1 rising security technology and offers the most simple, efficient and affordable solution.Netwrix solution provides detection of security incidents, vulnerability assessment, forensic analysis and continuous compliance. It also improves business continuity, enables root......

7. Check My Analytics

Check My Analytics How well is your Analytics set up? Use our auditing tool to audit your Google Analytics profile or your clients. Goals, Adwords, Filters, Duplicate Reports, Behavioural Tests, Content Groups, Site Search and more :-). The one-stop-shop for setting common issues in GA.We are addressing a gap in the market for......

8. Varonis

Varonis Varonis (NASDAQ:VRNS) is the foremost innovator and solution provider of comprehensive, actionable data governance software solutions, providing a Metadata Framework™ that enables customers with unstructured and semi-structured data residing on their Files Systems, SharePoint Sites, Exchange servers and NAS devices to audit data access activity, fix and maintain access controls,......

9. Arpwatch

Arpwatch arpwatch is a computer software tool for monitoring Address Resolution Protocol traffic on a computer network. It generates a log of observed pairing of IP addresses with MAC addresses along with a timestamp when the pairing appeared on the network. It also has the option of sending an email to......

10. victims

victims The victims project provides a canonical database of known-vulnerable JAR files, along with tools to compare this database to Java applications in development, release and production environments.......

11. ApexSQL Audit

ApexSQL Audit ApexSQL Audit can audit all SQL Server activities such as data and objects access and changes, failed logins and security changes. It helps SQL DBAs to meet SQL Server audit compliance requirements by using many built-in audit reports. Use ApexSQL Audit to manage auditing across multiple SQL Server instances from......

12. Tinfoil Security

Tinfoil Security Tinfoil Security provides a simple website application security solution by routinely monitoring and checking for vulnerabilities using a constantly updated scanner.......

13. Dependency-Check

Dependency-Check Dependency-Check is a utility that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities. Currently Java and .NET dependencies are supported.......

14. GSMmap

GSMmap The GSM Security Map at gsmmap.org compares the protection capabilities of mobile networks. This app collects data and adds it to GSM Map.This application currently only works on Android 4.1.2 Samsung S2 and S3 devices and requires root priviliges during the mobile network data capture.Note: Custom Android systems like Cyanogenmod......

15. Android IMSI-Catcher Detector

Android IMSI-Catcher Detector AIMSICD is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as "StingRay", "Cellular Interception" and alike.......