Users with registered businesses can purchase goods from merchants on the platform to satisfy their business needs. Users are not permitted to utilize any products acquired through the platform for resale, advertising, business, or further distribution.
For each purchase made, users will receive a Tax Invoice (or 'GST invoice') that includes specific details such as:
the GSTIN of the user associated with their registered business, and
the specified Entity Name for their business.
It should be noted that not all products are eligible for GST Invoice. Only the products displayed by participating sellers with the 'GST-based Invoice Available' callout on the product description page would qualify.
Certain goods and services are not eligible to get a GST Invoice, including items with VAS, i.e., Value Added Services (e.g., Total Mobile Protection/Assured Buyback) and those involving an exchange offer at the time of purchase.
Users must ensure the accuracy of the GSTIN, and business entity name provided for the GST Invoice. Requests for corrections into GST Invoice would not be accommodated by Techjockey.com or any Seller, and any issues arising from user-provided information are the sole responsibility of users.
Techjockey.com is not liable for the GST Invoice or any associated input tax credit. To efficiently claim an input tax credit, users should select the registered place of business address as per the GST authority's data and follow the provisions of the GST Act and rules.
To claim an input tax credit, the delivery and billing addresses must match. Furthermore, input tax credits will not be granted if the delivery address and GSTIN on the invoice are from different states. In case of incorrect GST details provided during the order placement, the order will be canceled automatically.
Buy Now & Pay Later, Check offer on payment page.
Get Instant Expert Advice
Safe & Secure Payment
Assured Best Price Guaranteed
Description
Pricing
Features
Specification
Review
OSSEC Pricing & Plans
OSSEC price is available on request
Looking for pricing details, customization requirements or have other queries? We are just a click away.
OSSEC Gallery
OSSEC Features
Log based Intrusion Detection Analyzes system and application logs in real time to detect security events, misuse, policy violations, and intrusion attempts.
File Integrity Monitoring Tracks changes to files, directories, and registry entries to detect unauthorized modifications and potential intrusion
Rootkit Detection Engine Scans system files, processes, and memory structures to identify hidden malicious software and unauthorized privilege escalation.
Malware Detection Detects malicious files, processes, and suspicious activity patterns to identify and respond to system compromise incidents.
Active Response Automation Automatically executes response actions such as blocking IP addresses or disabling accounts when security threats are detected.
Centralized Security Management Provides centralized management for monitoring, configuration, and policy enforcement across multiple monitored endpoints.
Windows Registry Monitoring Monitors Windows registry for unauthorized changes, ensuring detection of configuration tampering and malicious persistence.
Security Event Correlation Engine Correlates multiple security events and log sources to identify attack patterns and suspicious system activity reliably.
Endpoint Monitoring Uses installed agents to collect security events, system logs, and file integrity data from monitored endpoints continuously.
Agentless Monitoring Capability Monitors remote systems, network devices, and infrastructure without installing agents using secure access methods.
Security Policy Enforcement Applies and enforces defined security policies across monitored systems to maintain security compliance and integrity standards.
Inventory Management Collects and maintains information about system hardware, software, services, and network configurations for visibility.
Log Collection Framework Collects logs from operating systems, applications, and network devices for centralized analysis and threat detection workflows.
Custom Security Rules Engine Allows creation and modification of custom detection rules to identify organization-specific security threats and events.
Security Incident Notification System Delivers alerts via configured channels such as email, syslog, or messaging systems for immediate threat awareness response.
OSSEC Specifications
Supported Platforms :
Device:
Deployment :
Suitable For :
Business Specific:
Business Size:
Customer Support:
Integration:
Training:
Language:
WindowsMacOSLinux
Desktop
Web-Based, Perpetual
All Industries
All Businesses
Small Business, Startups, Medium Business, Enterprises, SMBs, SMEs, MSMBs, MSMEs