Product
CUSTOMERS CAN DOWNLOAD THE ZECTONAL DEEP DATA INSPECTION™ SUITE OF PRODUCTS INCLUDING ZCT™, ZECT™, AND ZECTED™ TO RUN ON A PUBLIC CLOUD, PRIVATE CLOUD, HYBRID CLOUD, EDGE COMPUTING DEVICES, EVEN ON EMBEDDED IOT DEVICES.
GET STARTED Quickly
To get started quickly, and for a more detailed understanding of specific monitoring capabilities and generated events, visit our Getting Started page on GitHub.
Individual
ZCT™
A Perfect Place to Start
FREE
File Based License For Small Businesses
DATA SERVICE LEVEL MONITORING
- Source Availability Monitoring
- Flow Availability Monitoring
- Late Data Monitoring
DATA SECURITY MONITORING
- Unknown File Detection
DATA VOLUME MONITORING
- Temporal File Count Monitoring
- Temporal Size Monitoring
DATA CONTENT MONITORING
- Duplicate Content Detection
THIRD PARTY INTEGRATION
SUPPORT
- Web Best-Effort Support
Team
ZECT™
Everything in Individual:
Monthly Pricing
File Based License For Small Businesses
DATA SERVICE LEVEL MONITORING
- Source Availability Monitoring
- Flow Availability Monitoring With Adoptive Thresholding
- Late Data Monitoring
DATA SECURITY MONITORING
- Unknown File Detection
- Content Threat Monitoring
DATA VOLUME MONITORING
- Temporal File Count Monitoring With Adoptive Thresholding
- Temporal Size Monitoring With Adoptive Thresholding
DATA CONTENT MONITORING
- Duplicate File Detection
- Schema Compliance Monitoring
- Sparse (null value) Threshold Monitoring
- Duplicate Content Detection
THIRD PARTY INTEGRATION
SUPPORT
- Email Support During Business Hours
Enterprise
ZECTED™
Everything in Team:
Ask Us
Unlimited Files and Sources
DATA SERVICE LEVEL MONITORING
- Source Availability Monitoring
- Flow Availability Monitoring With Adoptive Thresholding
- Late Data Monitoring
DATA SECURITY MONITORING
- Unknown File Detection
- Content Threat Monitoring
DATA VOLUME MONITORING
- Temporal File Count Monitoring With Adoptive Thresholding
- Temporal Size Monitoring With Adoptive Thresholding
DATA CONTENT MONITORING
- Duplicate File Detection
- Schema Compliance Monitoring
- Sparse (null value) Threshold Monitoring
- Duplicate Content Detection
THIRD PARTY INTEGRATION
- Fully enabled REST API
- Identity Management Integration
SUPPORT
- 24/7/365 Phone Support