Skip to content
eAuditor WEB AI
  • FUNCTIONS
    • IT ManagementV9 AI
      • Remote management of computers
      • Remote installation
      • Patch managementNew V9 AI
      • Management via task server
      • Software audit (SAM)
      • Automation server
      • Message server
      • Reports
      • Helpdesk
      • Learning Management System
      • IT administrative notifications
    • IAM ManagementNew V9 AI
    • IT Monitoring
      • Network monitoring
      • Monitoring computers
      • Monitoring of software and operating systems
      • Monitoring your virtualization environment
      • User monitoring
      • Email monitoring
      • Device monitoring
      • Monitoring of websites
      • Server room monitoring
    • IT Inventory
      • Inventory of computers and servers
      • Inventory of operating systems
      • Inventory of virtualization servers and virtual machines
      • Inventory of all types of equipment
      • Inventory of software
      • Inventory of files
      • Inventory of printers
      • IT Warehouse
      • CMDB
    • IT SecurityV9 AI
      • BitLocker remote encryption
      • Remote firewall managementNew V9 AI
      • Two-factor authenticationV9.2 AI
      • Screen monitoringNew V9.2 AI
      • Analysis of key IT security metrics (SOC)
      • Vulnerability managementNew 9.3 AI
    • Employee panelV9 AI
    • Artificial intelligence (AI)V9 AI
    • DLPNew V9.2 AI
  • DEMO
  • PRICING
  • SUPPORT
  • ACTUALITIES
    • CASE STUDY
      • Implementation at the City Hall
      • Implementation at the District Office
      • Implementation of eAuditor in the IT industry
    • BLOG
    • KNOWLEDGE BASE
  • WEBINARS
  • CONTACT US
  • PARTNERS
  • Polish

Good practices for entitlement management

Good practices for entitlement management Ensure safety and efficiency at work in accordance with regulations [...]

New preset tasks and AI in eAuditor v9 scripts

New predefined tasks and AI in eAuditor scripts Learn more about what's new in the [...]

Get compliant with the NIS2 directive with eAuditor IAM

Secure the future of your business Get compliant with the NIS2 directive with eAuditor IAM [...]

eAuditor IAM – Request and Entitlement Management – what’s new in version 1.9.0.?

eAuditor IAM - Request and Entitlement Management - what's new in version 1.9.0.? Check what [...]

Preparing for a NIK audit

Preparing for a NIK Inspection Key system features to support compliance and security [...]

Strategies and methods to reduce data leakage

Strategies and methods to reduce data leakage Find out how to protect your personal data [...]

What is the eAuditor IAM minimum authority rule?

What is the principle of minimum entitlements? How to use it effectively with the eAuditor [...]

eAuditor IAM – Request and Entitlement Management – what’s new in version 1.8.0.?

eAuditor IAM - Request and Entitlement Management - what's new in version 1.8.0.? Check what [...]

Previous2Next

TAGI

Case Study IAM IT Management IT monitoring IT Security Module for Signallers NIS2 Updates
eAuditor Cloud

eAuditor cloud® – cloud version of the system, now free for up to 100 computers

Use it for free!
ea_stopka
Form

NEWSLETTER

    For more information, see our personal data processing policy..

    IT Management

    Remote management of computers

    Management via task server

    Remote installation

    Remote patch management

    Software Asset Management

    IAM management

    Automation server

    Message server

    Reports

    Helpdesk

    Learning Management System (LMS)

    Administrative Notifications

    IT monitoring

    Network monitoring

    Monitoring of software and operating systems

    Monitoring your virtualization environment

    Device monitoring

    User monitoring

    Email monitoring

    Monitoring of websites

    Server room monitoring

    IT inventory

    inventory of computers and servers,

    inventory of virtualization servers and virtual machines,

    Inventory of operating systems

    Inventory of applications and packages

    Inventory of files

    Inventory of printers

    Inventory of all types of equipment

    IT Magazine

    CMDB

    IT Security

    BitLocker remote disk encryption

    Remote firewall management

    Blocking access to websites and processes

    USB blocking

    IT security analysis (SOC)

    Application blocking

    Two-factor authentication

    Vulnerability management

    Artificial intelligence

    Website classifier – AI

    Process classification – AI

    AI in CMD and Powershell

    Video authentication

    Integration with ChatGPT

    Helpdesk integration with ChatGPT

    eA Intelligence – personal AI assistant

    Intelligent Log Analysis

    © Copyright 2026 BTC Sp. z o.o. | www.btc.com.pl | All Rights Reserved | Cookie Policy | Privacy Policy | Contact.

    Page load link