Skip to content
eAuditor WEB AI
  • FUNCTIONS
    • IT ManagementV9 AI
      • Remote management of computers
      • Remote installation
      • Patch managementNew V9 AI
      • Management via task server
      • Software audit (SAM)
      • Automation server
      • Message server
      • Reports
      • Helpdesk
      • Learning Management System
      • IT administrative notifications
    • IAM ManagementNew V9 AI
    • IT Monitoring
      • Network monitoring
      • Monitoring computers
      • Monitoring of software and operating systems
      • Monitoring your virtualization environment
      • User monitoring
      • Email monitoring
      • Device monitoring
      • Monitoring of websites
      • Server room monitoring
    • IT Inventory
      • Inventory of computers and servers
      • Inventory of operating systems
      • Inventory of virtualization servers and virtual machines
      • Inventory of all types of equipment
      • Inventory of software
      • Inventory of files
      • Inventory of printers
      • IT Warehouse
      • CMDB
    • IT SecurityV9 AI
      • BitLocker remote encryption
      • Remote firewall managementNew V9 AI
      • Two-factor authenticationV9.2 AI
      • Screen monitoringNew V9.2 AI
      • Analysis of key IT security metrics (SOC)
    • Employee panelV9 AI
    • Artificial intelligence (AI)V9 AI
    • DLPNew V9.2 AI
  • DEMO
  • PRICING
  • SUPPORT
  • ACTUALITIES
    • CASE STUDY
      • Implementation at the City Hall
      • Implementation at the District Office
      • Implementation of eAuditor in the IT industry
    • BLOG
    • KNOWLEDGE BASE
  • WEBINARS
  • CONTACT US
  • PARTNERS
  • Polish

Updates

EntraID in eAuditor V9.2 AI

Microsoft's Entra ID in eAuditor System V9.2 AI New standard for identity and security management [...]

TAGI

Case Study IAM IT Management IT monitoring IT Security Module for Signallers NIS2 Updates

NOWOŚCI

  • Cyber security in healthcare – how eAuditor IAM protects patient data
  • EntraID in eAuditor V9.2 AI
  • eAuditor IAM – A revolution in identity and access management
  • NIS2 #15: MFA two-factor authentication
  • Funding opportunity for the purchase and implementation of eAuditor IAM under the grant competition – Cyber Secure Government
eAuditor V8 AI
Form
E-mail

NEWSLETTER

    For more information, see the personal data processing policy.

    IT management

    Remote management of computers

    Management via task server

    Remote installation

    Remote patch management

    Software management

    IAM management

    Automation server

    Message server

    Reports

    Helpdesk

    Employee training system (LMS)

    Administrative notifications

    Employee panel

    IT monitoring

    Network monitoring

    Monitoring of software and operating systems

    Monitoring virtualization environments

    Device monitoring

    User monitoring

    Email monitoring

    Service monitoring

    Server room monitoring

    IT inventory

    Computer and server inventory

    Inventory of virtualization servers and virtual machines

    Inventory of operating systems

    Inventory of applications and packages

    File inventory

    Printer inventory

    Inventory of all types of devices

    IT warehouse

    CMDB

    IT Security

    BitLocker remote disk encryption

    Remote firewall management

    IT security analysis (SOC)

    Two-factor authentication

    DLP

    Artificial intelligence

    Website classification – AI

    Process classification – AI

    AI in CMD and Powershell

    Video authentication

    Integration with ChatGPT

    Helpdesk integration with ChatGPT

    © Copyright 2025 BTC Sp. z o.o. | www.btc.com.pl/en/ | All Rights Reserved | Cookie Policy | Privacy Policy | Contact

    Page load link