Our full-featured software is available in 3 different pacakges. Pricing is based on your package, asset count, and administrator licenses.
                Basic
                        Premium
                        Premium+
                    Monitoring & Alerting
                            
                                Continuously track the health and performance of various endpoints and receive alerts on your preferred channel.
                            
                        Real-time Monitoring
                            
                                Continuously tracks the health and performance of various endpoints (servers, workstations, network devices, virtual machines, etc.). This includes CPU usage, memory utilization, disk space, network traffic, and more.
                            
                        ✔
                        ✔
                        ✔
                    Customizable Thresholds
                            
                                Allows setting specific performance thresholds for different metrics. When these thresholds are breached, the system generates alerts.
                            
                        ✔
                        ✔
                        ✔
                    Intelligent Alerting
                            
                                Provides various notification methods (email, SMS, integrations with ticketing systems) and allows for alert escalation rules to ensure critical issues are addressed promptly.
                            
                        ✔
                        ✔
                        ✔
                    Health Checks
                            
                                Regularly checks the status of critical services, applications, and processes to ensure they are running correctly.
                            
                        ✔
                        ✔
                        ✔
                    Log Monitoring
                            
                                Centralizes and analyzes logs from various systems to identify potential issues and security threats.
                            
                        ✔
                        ✔
                        ✔
                    AI Log Anomaly Detection
                            
                                Automatically scan logs for anomalous patterns to detect any new patterns that might suggest malfunction or insecurity.
                            
                        ✖
                        ✖
                        ✔
                    Remote Access & Control
                            
                                Remotely access and control managed devices to troubleshoot problems, perform maintenance, and provide support.
                            
                        Secure Remote Control
                            
                                Enables technicians to remotely access and control managed devices to troubleshoot problems, perform maintenance, and provide support. This often includes features like screen sharing, file transfer, and remote command line access.
                            
                        ✖
                        ✔
                        ✔
                    Backgrounding Tools
                            
                                Allows technicians to perform tasks in the background without interrupting the end-user's work.
                            
                        ✖
                        ✔
                        ✔
                    Unattended Access
                            
                                Enables access to devices even when no user is logged in, crucial for after-hours maintenance and support.
                            
                        ✖
                        ✔
                        ✔
                    Threat Detection
                            
                                Continuously track the health and performance of various endpoints and receive alerts on your preferred channel.
                            
                        Security Auditing
                            
                                Logs administrative actions and access attempts for security and compliance purposes.
                            
                        ✔
                        ✔
                        ✔
                    Endpoint Security Integration
                            
                                May integrate with or provide basic endpoint security features like antivirus management and web filtering.
                            
                        ✖
                        ✔
                        ✔
                    AI Threat Simulation
                            
                                Create simulated threats throughout the infrastructure at semi-regular intervals to test controls and detection systems.
                            
                        ✖
                        ✖
                        ✔
                    Automation & Scripting
                            
                                Create and schedule automated tasks to perform routing maintenance including disk cleanup and restart.
                            
                        Task Automation
                            
                                Enables the creation and scheduling of automated tasks to perform routine maintenance, such as disk cleanup, service restarts, and script execution.
                            
                        ✖
                        ✔
                        ✔
                    Scripting Capabilities
                            
                                Supports various scripting languages (e.g., PowerShell, Bash) to allow for custom automation and remediation tasks.
                            
                        ✖
                        ✔
                        ✔
                    Policy-Based Automation
                            
                                Allows defining policies that automatically trigger actions based on specific events or conditions.
                            
                        ✖
                        ✔
                        ✔
                    Reporting & Analytics
                            
                                Build and distribute detailed reports and trend analysis on system performance, uptime, asset inventory, patch compliance, and more.
                            
                        Comprehensive Reporting
                            
                                Provides detailed reports on system performance, uptime, asset inventory, patch compliance, and more.
                            
                        ✔
                        ✔
                        ✔
                    Performance Monitoring Dashboards
                            
                                Offers visual representations of key performance indicators (KPIs) to provide a quick overview of system health.
                            
                        ✔
                        ✔
                        ✔
                    Customizable Reports
                            
                                Allows users to create tailored reports based on specific data points and timeframes.
                            
                        ✖
                        ✔
                        ✔
                    AI-Powered Trend Analysis
                            
                                Helps identify performance trends and potential future issues.
                            
                        ✖
                        ✖
                        ✔
                    Patch Management
                            
                                Regularly scan managed devices for missing security patches, software updates and centralize patch deployment and compliance.
                            
                        Automated Patch Scanning
                            
                                Regularly scans managed devices for missing security patches and software updates.
                            
                        ✔
                        ✔
                        ✔
                    Patch Compliance Reporting
                            
                                Provides insights into the patch status of managed devices, highlighting any non-compliant systems.
                            
                        ✔
                        ✔
                        ✔
                    Centralized Patch Deployment
                            
                                Allows administrators to approve and deploy patches to multiple devices simultaneously, ensuring systems are up-to-date and secure.
                            
                        ✖
                        ✔
                        ✔
                    Platform Features
                            
                                Thunderwatch's own platform is built to be scalable, user-friendly, and secure.
                            
                        Two-Factor Authentication
                            
                                Secures access to the ThunderWatch platform itself.
                            
                        ✔
                        ✔
                        ✔
                    Full Integration SDK & API
                            
                                Ability to integrate with other IT management tools like ticketing systems, PSA (Professional Services Automation) platforms, and security solutions.
                            
                        ✔
                        ✔
                        ✔
                    Mobile Accessibility
                            
                                Allows technicians to monitor and manage systems from mobile devices.
                            
                        ✔
                        ✔
                        ✔
                    Contact us for a pricing quote