Ipswitch software helps IT teams at almost every federal civilian agency and military branch to securely transfer mission-critical information and assure the performance of their networked infrastructures and applications.
From rapidly deployable networks in combat zones to 24/7 assurance of civilian IT application services availability, Federal agencies depend on Progress® WhatsUp® Gold to keep them running and keep them safe. Monitor any mix of networks, servers, virtual machines, applications and traffic flows across Windows, LAMP, Java and cloud environments. To simplify the Federal acquisition process, Ipswitch products are available on GSA Schedule, SEWP V, CIO-CS, ITES-SW and other contract vehicles through our approved reseller partners.Download Free Trial
Security and readiness requires a truly auditable networked environment. Progress® WhatsUp® Log Management Suite is a highly automated and ultra-accurate tool that collects, stores, archives and backs-up Syslog, Windows events, or W3C/IIS logs. Identify potential threats through continuous log monitoring and get alerts to notify you of activity on your network.Download Free Trial
Leverage FIPS 140-2 validated software to securely transfer operational data, financial information and Personally Identifiable Information (PII). Ensure delivery to the intended recipients and document transfer activities with an audit trail. Use an intuitive interface to easily develop tasks and workflows without advanced programming skills. Push and pull files to/from any FTP, Unix, email or file server.
MOVEit assures maximum security with encryption of data at rest and in motion, guaranteed delivery, non-repudiation, tamper-evident audit logs and integration with your existing security infrastructure.
MOVEit Transfer, MOVEit Automation and WS_FTP Server are Federal Information Processing Standard (FIPS) 140-2 validated by the National Institute of Standards and Technology's laboratories.
WhatsUp Gold simplifies the job of identifying all network connections to sensitive data, ensuring devices are configured to compliance specs and providing audit trails to track suspicious network activity.