Product

CUSTOMERS CAN DOWNLOAD THE ZECTONAL DEEP DATA INSPECTION™ SUITE OF PRODUCTS INCLUDING  ZCT™, ZECT™, AND ZECTED™ TO RUN ON A PUBLIC CLOUD, PRIVATE CLOUD, HYBRID CLOUD, EDGE COMPUTING DEVICES, EVEN ON EMBEDDED IOT DEVICES.

GET STARTED Quickly

To get started quickly, and for a more detailed understanding of specific monitoring capabilities and generated events, visit our Getting Started page on GitHub.

Individual

ZCT™

A Perfect Place to Start

FREE

File Based License For Small Businesses
DATA SERVICE LEVEL MONITORING
  • Source Availability Monitoring
  • Flow Availability Monitoring
  • Late Data Monitoring
DATA SECURITY MONITORING
  • Unknown File Detection
DATA VOLUME MONITORING
  • Temporal File Count Monitoring
  • Temporal Size Monitoring
DATA CONTENT MONITORING
  • Duplicate Content Detection
THIRD PARTY INTEGRATION
SUPPORT
  • Web Best-Effort Support

Team

ZECT™

Everything in Individual:

Monthly Pricing

File Based License For Small Businesses
DATA SERVICE LEVEL MONITORING
  • Source Availability Monitoring
  • Flow Availability Monitoring With Adoptive Thresholding
  • Late Data Monitoring
DATA SECURITY MONITORING
  • Unknown File Detection
  • Content Threat Monitoring
DATA VOLUME MONITORING
  • Temporal File Count Monitoring With Adoptive Thresholding
  • Temporal Size Monitoring With Adoptive Thresholding
DATA CONTENT MONITORING
  • Duplicate File Detection
  • Schema Compliance Monitoring
  • Sparse (null value) Threshold Monitoring
  • Duplicate Content Detection
THIRD PARTY INTEGRATION
SUPPORT
  • Email Support During Business Hours

Enterprise

ZECTED™

Everything in Team:

Ask Us

Unlimited Files and Sources
DATA SERVICE LEVEL MONITORING
  • Source Availability Monitoring
  • Flow Availability Monitoring With Adoptive Thresholding
  • Late Data Monitoring
DATA SECURITY MONITORING
  • Unknown File Detection
  • Content Threat Monitoring
DATA VOLUME MONITORING
  • Temporal File Count Monitoring With Adoptive Thresholding
  • Temporal Size Monitoring With Adoptive Thresholding
DATA CONTENT MONITORING
  • Duplicate File Detection
  • Schema Compliance Monitoring
  • Sparse (null value) Threshold Monitoring
  • Duplicate Content Detection
THIRD PARTY INTEGRATION
  • Fully enabled REST API
  • Identity Management Integration
SUPPORT
  • 24/7/365 Phone Support