Our Products

SecureIT®

IT Infrastructure & Network Monitoring System

SecureIT is enterprise class network and resource monitoring system which works on detection and prevention mechanism. Core Network Monitoring System (CNMS) is also an enterprise class network and resource monitoring system works on detection and prevention mechanism. The entire IT infrastructure of an organization can be monitored & controlled centrally using CNMS, which includes Desktops, Printers, Switches, Scanners, Modems, Firewalls, Routers, Servers, External medias, USBs and Internet use etc. CNMS is developed using Advanced Java, Apache Tomcat and Oracle. This solution occupies very small space on central server & desktops and consumes only 1 kbps of bandwidth.


SecureIT Features :
• One integrated set of monitoring system that provides network discovery, monitoring, event management,
   configuration IT Infrastructure monitoring which includes Servers,Desktops,Printers and Routers
• Network discovery and monitoring that can improve network availability and efficiencies
• Central monitoring console for all the locations of an organization
• Enables the administrator to perform real-time monitoring on a huge network for all devices
• Enables the administrator to perform detection & prevention of applications, websites and intruders
• Problematic indication is available using Colours and Sound beeps for all the location at central place
• SMS & Email alerts for all or critical application or device failure
• History report of device or machine for any given period
• Multiple device are monitoring through single console
• Monitoring console through Web based mechanism using laptop,tab & mobile is possible anywhere
• Very cost effective licensing for lifetime
• Highly alert sensitive
• Highly secured
• Very easy to use



Centralized Desktop & Server Monitoring

Monitoring is critical to the delivery of effective management services that keep your customers' IT infrastructure up and running. An effective infrastructure and systems monitoring program allows you to detect and respond to critical availability and security issues before they reach a crisis level, as well as empowers you to become more proactive and make better infrastructure planning decisions based on historical trending and detailed usage analysis. Reliable monitoring is the only cost-effective method to gain critical insight into network and systems operations as a way to provide value-focused services.
There are two types of monitoring :
1] Desktop Monitoring
2] Server monitoring


Desktop Monitoring :
• Hardware Configuration Details
• Threshold Setting for CPU, RAM, Drives
• Operating System Information, Version, Patches etc
• List of Installed Applications
• List of File and Folder in Drives
• Desktop in LAN monitoring
• Windows Patch Management
• Computer Status
• System Login/Logoff details with date and time
• Application License Management,Installation Date, Version Information
• Detection of New Application Installation & Un-installation
• Color Code and Sound Alerts for each misuse or fault
Auto Config & Heal:-
      a. Password Reset
      b. Windows Feature Enable/Disable
      c. Batch Script
      d. Custom Script
      e. Add Custom Script
      f. Write Filter Enable/Disable
      g. Remote Desktop(Lock Screen)
      h. Check Disk(chkdsk)
      i. UnInstall Software
      j. Computer Events
      k. Change IP to Static and Dynamic
Dashboard:-
      a. Zone Wise Dashboard
      b. Asset Management
      c. Quick System Repair
      d. Patch Management
      e. OS & AP Management
      f. DHCP Dashboard
      g. Database Dashboard


Server Monitoring :
• Hardware Configuration Details
• Threshold Setting for CPU, RAM, Drives
• Operating System Information, Version, Patches etc
• List of Installed Applications
• Server Monitoring - Application, Database etc
• Folder Monitoring - Delete, Changes, Copy
• Detection of New Application Installation & Un-installation
• Remote Desktop Management
• E-mail Alerts for Critical Application,Devices or Services Failure
• Service Escalation Matrix
• Windows Patch Management
• System Login/Logoff details with date and time
• Server Status (On/Shut Down)

 

ATM Terminal Security

Today bank’s IT departments and ATM service providers face tremendous pressure to ensure that their ATMs comply with many different security concerns, policies, operating procedures, corporate IT standards, and regulations.

Velox has introduced ScanPlus ATM Terminal Security to ensure the greatest degree of visibility and control over secured ATM operations, and helps to enforce regulatory compliance put forward by RBI. ScanPlus ATM Terminal Security is bundled with Application Whitelisting, Full Hard Drive Encryption, USB Enable/Disable, Bios Password & Lan Monitoring.

ScanPlus ATM Terminal Security Features :
• Application Whitelisting
• Application Blacklisting
• Application Sand Boxing
• USB Protection
• Full Hard Drive Encryption
• BIOS Password
• OS & Access Privilege Management
• Patch Management
• EJ Pulling
• Timebased Access Management
• Content Distribution Management
• LAN Monitoring


Security Operation Center
(SOC)

A Security Operation Centre (SOC) is a facility that monitors and analyzes activity on networks, servers, endpoints, databases, applications, websites and other systems looking for anomalous activity that could be indicative of a security incident or compromise.


Features :
• Reduce Risk and downtime.
• Enhance Threat Control
• Dashboard or Reports that reflects organizational risk status
• Provides Continuous Prevention/Protection & Detection
• Proactive monitoring of network and security infrastructure devices

 

Cyber Security

We help clients define a comprehensive cyber security strategy, priorities investments and align security capabilities with strategic imperatives of the organisation. Additionally, we also help clients define business-driven enterprise security architecture, create sustainable solutions to provide foundational capabilities and operational discipline and maintain agility in the event of business/technology changes and protect the value of our clients’s information.

 

CoreIT Helpdesk

Technical support services are available to our clients through our Helpdesk support services. We help our clients in troubleshooting problems using our enterprise ticketing system over email, by phone or on-site. Using Remote monitoring and management (RMM) technical support service tool we take control of your desktops remotely to help you serve better.

 

File Integrity System

• Monitor and detect real time changes of your critical file with high integrity
• Tracking the critical file and change in file like addition, deletion of content
• Preventing file change
• Preventing deletion in file
• Restoring the previous file change

 

Core IT Knowledgebase

Core IT knowledge base is a technology used to internally store and distribute technical information, within a company. Normally created with IT knowledge base software, it is a self-service system designed to let employees or internal customers find answers to technical information independently of the IT department. With Zendesk, companies can easily build, update,
and customize an IT knowledge base that meets the specific needs of every company.

 

Change Management System

The objective of change management in this context is to ensure that standardized methods and procedures are used for efficient and prompt handling for all the changes to control IT infrastructure and to mitigate the impacts of the same.

• CRF Entry or Raising an Request
• Department wise approval
• Single & Dual Authorization
• Alerts for CRF though SMS & Email
 


IT Assets Management

IT asset management software is all about keeping track of every asset your company owns. But when it comes to being responsible for all the coffee stained keyboards, lapsed warranties, and broken printers, things don’t seem all that simple and easy. IT asset management is no longer limited to tracking your assets but also offering solutions and assessing the inventories status, its impact, expenses and much more. Manage your assets and keep track of all the CIs and assets lifecycle in your organization, through a centralized location.

• This module keeps track of Assets Purchase Entry, Warrenty and AMC Cycle Monitoring, Insurance Expiry
• Alerts via SMS, E-mails, Pop up to the Concern
• Bill, Invoice, AMC or SLA Agreement, Insurance Policy upload facility
• Depreciation Calculation

 

Customer Relationship Management
(CRM)

Customer Relationship Management is based on Information Technology Infrastructure Library (ITIL) & IT service management (ITSM) framework, that focuses on aligning IT services which is the needs of business in the day to day world. Customer Relationship Management is a game changer in turning IT teams from daily fire-fighter's to delivering awesome customer service.

 

ScanPlus AntiVirus

ScanPlus Antivirus, a unique solution in the world of Information Technology, offers loads of features in addition to basic Antivirus traits that prevent, detect and remove malicious software from your system. Tested satisfactorily, our product features fulfill all the requirements and meet all security benchmarks. ScanPlus Antivirus protects your computer against viruses, worms, Trojans, adware and spyware and other risks. In this manual these are referred to as viruses or malware(harmful software) and unwanted programs.


Features :
• Intelligent AntiVirus With new SecureShield Technology
• Anti-malware Protection
• Anti-spam
• Automatic Software Updater
• AccessAnywhere
• Data Shredder
• Virus & Web Protection
• Parental & Corporate Security
• Centralixed Updating Mechanism
• Centralized Monitoring Console



ScanPlus Mobile Security

ScanPlus Security app that optimizes your app, memory space, junk(cache) files and battery power and privacy while keeping your device safe from virus and trojan.


Features :
• Scaning Againts Harmful Application
• Anti-Theft Updation Mechanism
• Battery & Memory Optimizer
• Privecy Protection

Hospital Management System

VELOX has developed a core package known as – Hospital Management System that addresses all major functional areas of Hospital. The solution is based on latest technologies based on browser and coded using Advanced Java, J2EE, TOMCAT and Oracle database. This Solution is platform independent and can be integrated using any RDBMS and operating system. The development environment ensures that Velox has the portability and connectivity to run on virtually all standard hardware platforms with stringent data security and easy recovery in case of a system failure. VELOX provides the benefits of streamlined operations, enhanced administration and control, improved response to patient care, cost control, and increased profitability. At VELOX, we believe that every hospital is unique in terms of its requirements and priorities. Hence, flexibility has been built into VELOX to allow easy customization. salient features one integrated view to patients for entire family for any genetic dieses to Billing, Collection, Discharge Detail, Patient Medical History etc. Package supports adaptability & Scalability of software making it more robust. General and Standardized health packages for the OPD and IPD patients authentication and verification of entries through Audit Trail Facility Easy Query Handling for instant decision of Bed Allocation for Patients, and request for the Bed Transfers Effective Search facility to search any type of information related to Patient History Graphical Presentation of the Data for Top Management for analysis . Comprehensive Performance Reports. Built in Work Flow Management for all functional areas Multiple Store Accounting Interface facility with the Smart Card Technology Interface with the Bar Code Interface with various Laboratory Equipments for Data Capturing Integration of Multiple units of Hospital.


Features Of CHMS
• One Integrated View to Patients for entire family for any genetic dieses to Billing, Collection, Discharge Detail, Patient Medical History etc
• Package support Adaptability & Scalability of software making it more robust
• General and Standardized Health Packages for the OPD and IPD Patients
• Authentication and verification of entries through Audit Trail Facility
• Easy Query handling for instant decision of bed allocation for patients, and request for the bed transfers
• Effective Search facility to search any type of information related to patient history
• Graphical Presentation of the Data for Top Management for analysis
• Comprehensive Performance Reports
• Built in Work Flow Management for all functional areas
• Multiple Store Accounting
• Interface facility with the Smart Card Technology
• Interface with the Bar Code
• Interface with various Laboratory Equipments for Data Capturing
• Integration of multiple units of Hospital


Benefits Of CHMS
• Core Hospital Management System is a new generation software which converges latest technology and administrative process to manage work process with in a hospital
• It is an integrated client server application which enables multiple users to work on a server
• It helps in improving reorganization of operations and operational control
• It also helps to computerize the process of gathering, assembling, and retrieving patient information that would thus help to improve the reply time to the demands of patient care
• Core Hospital Management System helps eliminate complexity in accounting, by retrieving information through its MIS by a click of the button
• It helps generate well-timed and precise patient information and helps in clinical audit
• It aids in faster administrative handling of patients and clinical assessment
• It also helps by reducing the Outpatient wait time and by making the Medical records easily accessible

ScanPlus AntiVirus

Network & IT Infrastructure Monitoring System

ScanPlus Antivirus, a unique solution in the world of Information Technology, offers loads of features in addition to basic Antivirus traits that prevent, detect and remove malicious software from your system. Tested satisfactorily, our product features fulfill all the requirements and meet all security benchmarks. ScanPlus Antivirus protects your computer against viruses, worms, Trojans, adware and spyware and other risks. In this manual these are referred to as viruses or malware(harmful software) and unwanted programs.


Features :
• Intelligent AntiVirus With new SecureShield Technology
• Anti-malware Protection
• Anti-spam
• Automatic Software Updater
• Access Anywhere
• Data Shredder
• Virus & Web Protection
• Parental & Corporate Security
• Centralixed Updating Mechanism
• Centralized Monitoring Console



Mobile based Tracking System

Velox unveiled in the city their latest invention Mobile based Tracking System. Mobile based Tracking System can be used as an aid to increase the efficiency of the organizations with proper utilization and management of its sales, marketing and service staff.

Mobile based Tracking System can also be used in a very proficient way with law enforcement agencies, in tracking the movement of any suspicious persons and utilizing the law enforcement officers to their best of ability minimizing the time involved in communication.


Mobile based Tracking System Features
•Real Time tracking
•Alerts
•Anytime anywhere access
•User friendly interface
•Access Control and User management
•Auto capture attendance
•task and customer management
•live notification
 

ScanPlus Multicast File Management

In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously. Multicast can be one-to-many or many-to-many distribution. Multicast should not be confused with physical layer point-to-multipoint communication.

Group communication may either be application layer multicast or network assisted multicast, where the latter makes it possible for the source to efficiently send to the group in a single transmission. Copies are automatically created in other network elements, such as routers, switches and cellular network base stations, but only to network segments that currently contain members of the group. Network assisted multicast may be implemented at the data link layer using one-to-many addressing and switching such as Ethernet multicast addressing, Asynchronous Transfer Mode (ATM), point-to-multipoint virtual circuits (P2MP) or Infiniband multicast. Network assisted multicast may also be implemented at the Internet layer using IP multicast. In IP multicast the implementation of the multicast concept occurs at the IP routing level, where routers create optimal distribution paths for data grams sent to a multicast destination address.

Multicast File Management is an encrypted multicast file transfer program, designed to securely, reliably and efficiently transfer files to multiple receivers simultaneously. Utility of Multicast File Management is distributing large files to large number of receivers, a reliable tool for data distribution over any network including satellite links (with two way communication), where the inherent delay makes any TCP based communication highly inefficient. The multicast encryption system is based on TLS with extensions to allow multiple receivers to share a common key; it has the capability to communicate over disjoint networks.

 

Data Base Monitoring System

Databases are a critical component of the information technology infrastructure of business houses. Database Monitoring is the process of assessing the availability, performance and functionality of the database.

The performance of databases defines the success of organizations in providing the 24x7 level of customer satisfaction and smooth operations of day to day business activities.

Database Monitoring Services help you to monitor the performance of databases and provide extensive information so that necessary steps can be taken before a breakdown of vital business processes occurs.


Features of Data Base Monitoring System
•Centralized Server Monitoring
•Centralized Desktop Monitoring
•Centralized Network Monitoring
•LAN ,WAN, VSat Monitoring
•Router, Switch, Firewall & Jitter Monitoring