View

Sorting

Products found: 61

logo
Offer a reference bonus
1.40

AstroSoft HelpDesk

Использование HelpDesk при внедрении и эксплуатации решений класса ERP , при сопровождении корпоративных информационных систем и систем АСУ ТП, на поддержке конечных пользователей, позволяет снизить совокупную стоимость владения информационной системой. Основу AstroSoft HelpDesk составляет база данных Microsoft SQL Server , в которой регистрируются все заявки пользователей и инциденты с привязкой к пользователям, структуре организации, сервисам ИТ-системы и полная история их обработки, каталог пользователей, а также разнообразная служебная информация. Кроме того, в базе данных накапливаются ответы на наиболее часто задаваемые вопросы и полезные сведения в виде иерархически структурированной Базы Знаний, предоставляющей возможности полнотекстового поиска на русском и английском языках. Возможности встроенного маршрутизатора позволяют организовывать сколь угодно сложные маршруты обработки заявок с автоматическим распределением между операторами и ролями в зависимости от специализации, квалификации, загруженности и организационной структуры предприятия. Конфигурирование системы и маршрутов выполняется посредством инструмента администрирования. Параметры AstroSoft HelpDesk гибко настраиваются в зависимости от потребностей заказчика. Функциональные особенности системы Масштабируемость Система AstroSoft HelpDesk может расти вместе с ростом потребностей предприятия, обслуживать как Intranet , так и Extranet пользователей. При необходимости распределения нагрузки по нескольким серверам легко создаются и подключаются новые точки входа в систему. Для распределения нагрузки на сервера баз данных, оптимизации трафика и организации сложных систем с независимыми службами поддержки и единой точкой контроля используется система нескольких связанных серверов баз данных. Использование стандартных технологий Использование при разработке системы технологий SQL, HTML, JavaScript, XML, SMTP, POP 3, . Net , Web services позволяет создавать дополнительные приложения и надстройки. Примером такой надстройки может быть автоматическое создание заявки в службу поддержки различными системными процессами при возникновении тех или иных внештатных ситуаций. Веб-интерфейс Сервер приложения построен на основе Microsoft Internet Information Server . Клиентом системы является Internet Explorer версий 5.01 и выше. Таким образом, отпадает необходимость установки дополнительного клиентского ПО на рабочие станции и обеспечивается минимальная совокупная стоимость владения системой. Для пользователя интерфейс приложения выглядит максимально просто, он интуитивно понятен и не требует лишних усилий при работе со службой поддержки. Удобство администрирования Несмотря на внутреннюю сложность и богатство возможностей системы, инструмент администрирования обеспечивает простой предметно-ориентированный интерфейс для формирования маршрутов. Администратор оперирует привычными понятиями, такими как тип запроса, уровень пользователя, филиал организации. Интеграция внешними приложениями Благодаря использованию протокола SOAP и технологий XML AstroSoft HelpDesk легко интегрируется с внешними приложениями. При использование разработанных АстроСофт коннекторов возможна интеграция с Microsoft MOM 2005 и Microsoft SMS 2003, а открытый интерфейс WEB - services и поддержка внешних приложений на уровне архитектуры позволяют легко создавать собственные коннекторы. Маршрутизация После начальной настройки системы HelpDesk движение запросов происходит автоматически. Постановка запроса на маршрут и его движение по нему производится согласно атрибутам запроса (например, по ключевым словам, сервису и / или типу запроса), атрибутам пользователя, зарегистрировавшему запрос, а также действиям операторов на промежуточных этапах маршрута. База Знаний База Знаний является важным элементом системы и служит для накопления и повторного использования полезной информации. Для удобства просмотра статьи Базы Знаний создаются в формате HTML с возможностью форматирования текста, вставки рисунков, ссылок и файлов любого типа. Система экспертного согласования и утверждения публикаций в Базе Знаний является уникальной особенностью системы AstroSoft HelpDesk. Полнотекстовый поиск Система предоставляет возможности полнотекстового поиска на русском и английском языках в Базе Знаний и в базе данных заявок пользователей. Существует также возможность встраивания в систему модулей полнотекстового поиска на любом другом языке и поддержки морфологического анализа. Средства анализа Мощная встроенная подсистема отчетов позволяет производить анализ заявок и инцидентов, выявлять проблемы корпоративной информационной системы, оценивать качество работы служб поддержки и планировать ее ресурсы. Благодаря реализации подсистемы на платформе MS Reporting services поддерживаются разработки и внедрение собственных отчетов. Уникальной и удобной особенностью является наличие планировщика отчетов : достаточно один раз настроить параметры и расписание, после чего система будет самостоятельно генерировать и отправлять отчеты подписчику. HelpDesk и ITIL Стандартная поставка системы позволяет внедрить в организациях процессы управления инцидентами, изменениями и уровнем сервиса. Управление уровнем сервиса Система позволяет создавать неограниченное количество групп пользователей с индивидуальным набором доступных сервисов и неограниченное количество соглашений, регулирующих порядок обслуживания этих сервисов. Управление инцидентами Встроенный маршрутизатор позволяет формализовать и автоматизировать все процедуры распределения запросов на закрытие инцидента. Использование соглашений об уровне сервиса позволяет автоматизировать процедуру приоретизации запросов. Управление изменениями Маршрутизатор позволяет сформулировать все этапы обработки запроса на изменения и обеспечить гарантированное исполнение всех процедур по согласованию и исполнению изменений. Расширение функциональности При использовании средств интеграции функциональность системы существенно расширяется. Компания АстроСофт предлагает готовые решения для реализации процессов управления непрерывностью, активами и конфигурациями. Центром управления процессами является система HelpDesk обеспечивающая доступ к необходимой для реализации процессов функциональности и данным непосредственно из операторской консоли. Маршрутизатор использует данные, поступающие из внешних систем, для инициации и изменения статусов запросов. Источник информации: http://www.itsmonline.ru/software/astrosoft/
... Learn more
-
ROI-calculator
Configurator
ROI-
-
14
9
logo
Offer a reference bonus
0.00

Auxilium Cyber Sec

Auxilium protects clients, partners and individuals as well as issues, which are most important for you (your freedom, your privacy, your protected workflows). Also we protect you from unauthorised access to your intern IT environment and to cyber attacks.

PENETRATION TESTING, SECURE DESIGN, IMPLEMENTATION

Infrastructure and cloud. Company provides visibility into the security state of your network from internal and external prospective and an extensive penetration test of your organization perimeter and identify weak links that can allow attacker to get access inside your network. Mobile and desktop software.Developing good software is not easy. But it is even harder to secure it properly. Team will test the security of your software, perform code reviews and ensure security of your customers. Web - your website represents your brand and can bare critical business functionality. At the same time it is one of the easiest attack surface to access. Therefore Auxilium wants to help you ensure that your web site is secure properly maintains its functionality by performing Penetration tests and analyzing the efficiency of existing security measures. Hardware (IoT devices, connected cars, robots, etc.).Auxilium performs an extensive penetration test, provides appropriate security measures for your specific scenario or help you to make your products secure by design.

RISK ASSESSMENT, THREAT MODELLING

Does your organization have a known problem in information security field or you simply want to increase the security level without knowing where to start? Auxilium can perform cost-effective and rapid analysis of your ICT environment pinpointing the most acute issues and assisting you with mitigating them.

SECURITY STRATEGY AND IMPLEMENTATION

Is your organization striving for comprehensive and efficient information security management with high long-term added value? Team will design Information Security Strategy following frameworks like ISO 27001 and PSI DSS, among others, and provide you with necessary assistance and experience to embed such Information Security Strategy seamlessly into your daily operations.

INCIDENT RESPONSE AND FORENSICS

Has information security inside your organization already been breached or are you suspicious that something is not right? Auxilium extensive expertise in intrusion detection and reverse engineering will help you uncover the high-profile security incidents including hacking intrusions or malware infections.

SOCIAL ENGINEERING PENETRATION TESTS

With the constant evolution of defensive technologies people remain the weakest link in the system. No matter how good your technologies are, attackers can exploit your employees to achieve their goals. Auxilium will simulate this threat for your organizations and help to educate your employees afterwards.

RED TEAMING

Are you ready to see what a real attacker what do to meet his objective? Are you ready to really test your defenses? Auxilium will identify weak links in your organization through pre agreed controlled attack scenarios (Digital, Physical and combined). It is a step beyond the traditional security testing and security reviews.

SECURITY TRAININGS

Auxilium really like to share our knowledge and experience. Team will teach your employees to detect social engineering attempts and improve their security awareness, and your developers to write secure code and your engineers to create solutions which are secure by design.

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
17
15
logo
Offer a reference bonus
1.00

Bigleaf Cloud-first SD-WAN

Our Software Defined Wide Area Network (SD-WAN) technology ensures that your business-critical applications are prioritized across your Internet connections and that all traffic flows are routed over the best connection in real-time. Site-to-Cloud Architecture Unlike box-only solutions, Bigleaf leverages both an on-site router and a dedicated backbone network, controlling traffic both to and from the Cloud. Intelligent Software Experience a seamless connection with our Intelligent Load Balancing, Dynamic QoS, and Same IP Failover–with zero manual configurations or policies required. Firewall-friendly design Bigleaf installs outside your LAN, so you can leave your best-of-breed security solution in place, without disabling any of its features. Monitoring and alerts We monitor each ISP connection, end-to-end, 10 times per second for packet-loss, latency, jitter, and capacity. You'll have access to logs and graphs, plus configurable email alerts.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
18
0
logo
Offer a reference bonus
2.20

BMC Remedy IT Service Management

BMC Remedy IT Service Management includes industry-leading applications - Customer Support BMC Remedy Service Desk, Asset Management Module BMC Remedy Asset Management, Change Management Module BMC Remedy Change Management, and BMC Service Level Management Service Level Management module. BMC Remedy IT Service Management Suite (BMC Remedy ITSM Suite) provides out of-the-box IT Information Library (ITIL) service support functionality. BMC Remedy ITSM Suite streamlines and automates the processes around IT service desk, asset management, and change management operations. It also enables you to link your business services to your IT infrastructure to help you manage the impact of technology changes on business and business changes on technology --- in real time and into the future. In addition, you can understand and optimize the user experience, balance current and future infrastructure investments, and view potential impact on the business by using a real-time service model. All this helps you manage what matters to deliver Business Service Management (BSM). BMC Remedy OnDemand is a cloud-based software as a service (SaaS) offering that gives your organization access to all the benefits of BMC's industry-leading IT Service Management solutions — without the costs and overhead associated with hosting and managing on-premise software. It enables you to consume BMC Remedy ITSM Suite by subscribing to a hosted service, which offers centralized hosting of BMC applications and data. Software upgrades are included as part of the service as soon as they become available.
... Learn more
ROI-calculator
Configurator
ROI-
-
7
9
logo
Offer a reference bonus
1.00

CA Service Management

The CA Service Management portfolio comprises CA Service Management, which includes its on-premise or managed-hosted offerings (CA Service Desk Manager and CA IT Asset Manager, including CA Service Catalog capabilities), CA Business Service Insight, and Xtraction for CA Service Management.  The CA Service Management solutions portfolio delivers ITSM capabilities that support ITIL initiatives, with 15 processes being PinkVERIFY-certified. Key products, such as CA Service Desk Manager and CA IT Asset Manager, are supported by a common configuration management database (CMDB), workflow, service catalog, mobility, and reporting engine, and a shared security model. Other related products include CA Business Service Insight and Xtraction for CA Service Management.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
17
logo
Offer a reference bonus
0.00

Cisco Connected Mobile Experiences (CMX)

Cisco Connected Mobile Experiences turns the industry-leading wireless infrastructure into an intelligent platform that not only provides a reliable connection, but also provides analytic customer information that you can use to grow your business. As the undisputed leader in the Wi-Fi market with over seven years of experience in Wi-Fi location, Cisco is a trusted partner Cisco Connected Mobile Experiences (CMX) uses a high-density wireless network with the Cisco® Mobility Services Engine, which enables organizations to collect aggregated location data for Wi-Fi users. CMX Analytics is a data visualization module that helps organizations use the network as a source of data for business analysis, highlight behavioral patterns and trends, which, in turn, can help businesses make informed decisions about how to improve customer service and improve their quality. service.

Benefits
With the CMX solution, you can:
  • Analyze business performance and optimize marketing activities through quantitative analysis of activity at your facility, for example, determining the patency of a particular store
  • Increase the profitability per square meter by optimizing the location using the detailed traffic of the outlet, the conversion rate of visitors into customers, as well as other information, up to specific zones, as well as quantifying the implementation of changes
  • Increase customer satisfaction by ensuring that there are enough staff during peak periods
  • Increase profitability using location data for optimal mobile marketing campaigns.
... Learn more
ROI-calculator
Configurator
ROI-
-
9
9
logo
Offer a reference bonus
0.00

Cisco Prime Infrastructure

Cisco Prime Infrastructure simplifies the management of wireless and wired networks. It offers Day 0 and 1 provisioning, as well as Day N assurance from the branch to the data center. We call it One Management. With this single view and point of control, you can reap the benefits of One Management across both network and compute. Features and Capabilities
Cisco Prime Infrastructure has what you need to simplify and automate management tasks while taking advantage of the intelligence of your Cisco networks. Product features and capabilities help you: Realize One Management
This single, unified solution provides wired and wireless lifecycle management, and application visibility and control. It also offers policy monitoring and troubleshooting with the Cisco Identity Services Engine (ISE) and location-based tracking of mobility devices with the Cisco Mobility Services Engine (MSE). You can manage the network, devices, applications, and users – all from one place.
Consolidate Products
Consolidate management products and reduce the number of tools required to manage the network. Managing your network using Cisco Prime Infrastructure gives you greater visibility and control, with faster deployment and troubleshooting. You can spend more time transforming your business through innovation and differentiation Manage the Network for Mobile Collaboration
Cisco Prime Infrastructure offers support for 802.11ac, correlated wired-wireless client visibility, spatial maps, Radio Frequency prediction tools, and much more. Simplify the management of the wireless infrastructure while solving problems faster and with fewer resources.
Simplify Intelligent WAN Management
Take management simplicity to the next level. Cisco Prime Infrastructure offers new, guided workflows for the Intelligent WAN and Converged Access, based on Cisco best practices. These workflows make new branch rollouts easy and fast, from setting up devices and services to automatically managing and monitoring them.
Extend Management to the Data Center
Cisco Prime Infrastructure offers fault, configuration, accounting, performance, and security (FCAPS) management with 360-degree views of Cisco Unified Computing System Series B Blade Servers and Series C Rack Servers and Cisco Nexus switches, including the Application-Centric Infrastructure–ready Cisco Nexus 9000 Series Switches. Your data center is critical to service assurance. Manage it effectively with Cisco Prime Infrastructure.
Speed Time to Value with Device and Technology Packs
Device Packs offer ongoing support of new Cisco devices and software releases. It provides parity within each device family, eliminating gaps in management operations, especially when it comes to service availability and troubleshooting. Technology Packs deliver new features between releases, accelerating time to value for high-demand functionality.
Scale Bigger
Large or global organizations often distribute network management by domain, region, or country. Cisco Prime Infrastructure Operations Center lets you visualize up to 10 Cisco Prime Infrastructure instances, scaling your management infrastructure while maintaining central visibility and control.
... Learn more
ROI-calculator
Configurator
ROI-
-
12
10
logo
Offer a reference bonus
2.70

Citrix SD-WAN

Modern businesses need a network that can keep up with the pace of digital – one that delivers the best experience for the applications central to innovation and growth. Citrix' next-generation WAN Edge solution delivers flexible, automated, secure connectivity and performance that keeps the workspace always-on. Only Citrix SD-WAN delivers:

  • Unparalleled experience for SaaS, cloud, and virtual applications
  • Choice of deployment options with automated connectivity to the cloud
  • Integrated visibility and control over all aspects of the WAN
In connection with the increased use of business-critical web applications, modern global networks (WANs) operate under load that exceeds their capacity. Extending the network with Multiprotocol Label Switching (MPLS) solutions is a traditional approach, but can be expensive. On the other hand, alternatives like broadband and other types of Internet connections cost less, but they are not always acceptable for certain applications. Global network virtualization technologies can help optimize the bandwidth of such a network in an organization at a lower cost compared to traditional solutions.
... Learn more
ROI-calculator
Configurator
ROI-
-
19
0
logo
Offer a reference bonus
0.00

ControlScan Managed SIEM

Gain visibility into attacks on your environment


Basic security measures are no longer sufficient to protect your business against today’s rapidly evolving cyber threats; this reality is made glaringly evident by the constant stream of breaches reported in the news. Traditional perimeter security technologies such as firewalls and Intrusion Prevention Systems (IPS)—as well as endpoint security like anti-malware—do not provide the broad and deep visibility across your IT infrastructure needed to detect these threats. Evidence of attacks and incursions within your environment can be found in log records and machine data generated by your networked systems, security devices and applications, but how do you unlock these critical insights? Most businesses struggle with the continuous investment in technology and people required to maintain ongoing monitoring of their security posture. The ControlScan Managed SIEM service combines enterprise-class SIEM technology from the ControlScan Cyphon platform with our deep security expertise and service excellence. Comprehensive service collects, correlates, analyzes and stores log data from network infrastructure, servers and applications in order to identify and mitigate security incidents while facilitating compliance with requirements within PCI, HIPAA, GLBA, SOX and other frameworks. The secure, cloud-based Cyphon platform collects log data generated by devices such as firewalls, IPS solutions, servers, desktops and applications. Correlation logic is applied to the aggregated logs to identify potential security threats, and alerts are generated and sent in real time, on a 24x7x365 basis. ControlScan Security Analysts are on hand to support the assessment and investigation of critical alerts and to provide guidance on proper response.

Key features of the ControlScan Managed SIEM Service

  • Log Collection for your entire IT infrastructure
  • Event Correlation and Analysis leverages multi-sourced log data and advanced correlation rule sets to detect security incidents
  • Prioritization and 24 x 7 Alerting
  • 12 Months of Log Retention for compliance requirements, including PCI DSS requirement 10
  • Reporting and Data Access available to you through ControlScan's web-based platform
  • Advance Functionality including:
  • File Integrity Monitoring (FIM)
  • Custom real-time dashboards

A Unique Solution to Solving the Security Challenge.

As the leader in providing cloud-based, unified security and compliance solutions, ControlScan offers unique value through its Managed SIEM service.

Deploy with ControlScan and get benefits that include the following:

Security-as-a-Service – Avoid costly, up-front investments in hardware, software and technical expertise with ControlScan’s cloud-based services. You’ll be up and running quickly and effectively with an enterprise-class, scalable solution. A solution that gets better with time – Ongoing upgrades and enhancements to the Managed SIEM service ensure the addition of new capabilities for identifying evolving attack methods. At the same time, your ControlScan security team is continually creating and tuning correlation rules for your environment to ensure maximum visibility to true, critical alerts. A staff of security experts watching your back – Only the largest organizations can afford a staff of resources maintaining security and compliance day-in and day-out. ControlScan brings extensive knowledge and experience in both areas, validated by the range of IT Security, PCI and HIPAA certifications held by our team of experts. This knowledge continues to grow as threats become more advanced. A single solution for your biggest challenges – The ControlScan Managed SIEM service delivers functionality you need on three different fronts: 1) Security 2) Compliance 3) Operations. By collecting, aggregating, correlating and analyzing data from your environment, you gain visibility to your organization’s overall security posture, support for key controls in most compliance frameworks, and assurance of the health of your networked systems.


... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
5
9
logo
Offer a reference bonus
0.00

CORE Security

Introducing CORE Security

When it comes to securing your cloud, you need to peace of mind that security’s at the core of your hosted infrastructure. That’s why we’ve put together three ServerChoice CORE Security™ packages, with varying levels of protection, so you can get best-fit cyber security for your organisation.

CORE Base

  • Two-factor authentication
  • TrendMicro anti-virus & malware protection
  • Vulnerability scanning: Unmanaged Quarterly
  • System hardening
  • Next-generation firewall
  • Advanced DDoS mitigation: Standard (20 Gbps)

CORE Enterprise

  • Two-factor authentication
  • TrendMicro anti-virus & malware protection
  • Vulnerability scanning: Unmanaged Monthly
  • System hardening
  • Next-generation firewall
  • File integrity monitoring
  • Advanced DDoS mitigation: Enhanced (250 Gbps)
  • 24/7 SIEM services

CORE Platinum

  • Two-factor authentication
  • TrendMicro anti-virus & malware protection
  • Vulnerability scanning: Managed Monthly
  • System hardening
  • Next-generation firewall
  • File integrity monitoring
  • Advanced DDoS mitigation
  • Pro (Terabit+)
  • 24/7 SIEM services
  • Intrusion Prevention System (IPS)

Bolt-on CORE Security™ Services

In addition to the above security packages, we offer a range of additional security enhancements to deliver maximum protection from cyber threats:
  • Data loss prevention (DLP)
  • Web application firewalls (WAF)
  • Penetration testing
  • URL filtering (Virtual Desktops only)
  • Email spam filtering and antivirus (Exchange only)
  • Compliance consultancy
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
10
5
logo
Offer a reference bonus
0.00

CyBot

Save time & money

Increase security by focusing on remediating  vulnerabilities that are a part of a validated attack path to a business process or critical asset

Key features:

  • Creates actionable insights based on critical vulnerabilities that threaten your business process for immediate alerts and remediation with one click
  • Continuous silent vulnerability scanning on all IP based devices on premise or in the cloud
  • Automatically detects critical assets and finds how hackers could reach and threaten them, no human involvement required.
  • Cronus is certified for Penetration Testing by CREST
  • Help comply with GDPR –require regular pen testing, vulnerability management and greatly reduces the risk of breach to your sensitive data.
Continuous. Perform continuous scans all year round, valid for both vulnerability management and penetration testing to stay on top of your network’s security 24/7. See live map and get real-time alerts on current threats to your business processes. Global. Cybot can be deployed globally and showcase global Attack Path Scenarios ™ so you can see how a hacker can hop from a workstation in the UK to a router in Germany to a database in the US. This capability is unique both for penetration testing as well as for vulnerability management.  The various CyBot Pros will be managed by a single Enterprise dashboard. Business Process Focused. CyBot brings context to each asset it scans, checking how it could affect a business process. In this way, you can funnel all your vulnerabilities and first focus on those that are exploitable and that are a part of an attack path to a critical asset or business process. This greatly reduces the resources needed for patching and ensures business continuity.

Which CyBot is right for me?

CyBot is a next-generation vulnerability management tool as well as the world’s first Automated pen testing solution, that continuously showcases validated, global, multi-vector, Attack Path Scenarios ™ (APS), so you can focus your time and resources on those vulnerabilities that threaten your critical assets and business processes. CyBot has one core engine: CyBot Pro, plus two additional management consoles. One for Enterprises and one for MSSPs. CyBot Pro is the workhorse of the product suite. It is a patented autonomous machine-based penetration test which initially scans the networks, its assets, its vulnerabilities and then takes the next step to map out and validate all the routes a hacker could take to reach your critical assets and business processes. Much like the process a human penetration tester would follow, but continuously and at a much larger scale and scope. CyBot Enterprise manages several CyBot Pros. This is great for larger organizations with global networks who wish to gain insights on global Attack Path Scenarios ™ between their branches, each using a different CyBot machine. CyBot Enterprise will aggregate information from all CyBot Pros for in-depth global insights on cyber threats to your business processes. CyBot MSSP provides large managed security service providers with full control of their Enterprise customers, each with their various CyBot Enterprise and CyBot Pro accounts. Schedule their scans, get alerts to your SIEM and much more

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
13
7
logo
Offer a reference bonus
0.00

Cyrebro

What Makes CYREBRO a Smart SOC?

CyberHat’s unique cyber security readiness assessment is based on years of practical offensive expertise. Company designed and built a unique, on-site, professional assessment that provides clear and tangible insights of an organizations cyber defense capabilities. They evaluate a client’s security readiness and provide a roadmap of remedial actions which address three core elements:
  1. Resilience
  2. Response
  3. Recovery abilities
Methodology is focused on the gap between theory and fact. The assessment creates a clear and coherent picture of the true cyber security posture of the organization and it’s ability to handle real life cyber incidents. Attack scenario analysis – CyberHat’s methodology includes a comprehensive analysis that is carried out by tracing known attack phases and examining how a potential attacker could exploit the organization’s existing gaps throughout the different attack vectors.
  • Technology Agnostic
The only managed SOC solution that is 100% technology agnostic. Manages more than 13 SIEM and log aggregation technologies.
  • Hacker Point of View
The design and operation of CYREBRO has the hacker point of view at its core, enabling us to provide the highest grade of professional cyber services.
  • SIEM Optimization
Optimizes customers’ existing SIEM technologies to reduce false positives, ensure true viability and verify the highest level of utilization.
  • Seamless Integration
CYREBRO’s unique lab team is dedicated solely to the research and execution of new and complex log sources and platforms.
  • Incident Response
CYREBRO I.R. team prepares the organization during the onboarding process and executes a professional response to any cyber threat.
  • Forensic Investigation
CYREBRO in-house forensic investigation team is responsible for all levels of advanced forensic investigation, from the host to the network level.
  • Threat Intelligence
CYREBRO in-house intelligence team provides daily threat intelligence analysis, synchronizing directly to the CYREBRO platform to enrich monitoring capabilities.

CYREBRO Business Models

  • CYREBRO Core. Helping clients utilize their existing technologies
  • CYREBRO One. A full turnkey solution that gets you up and running quickly and professionally
  • CYREBRO X. Enabling SMBs' the most professional managed SOC with fortune 100 grade
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
17
0
logo
Offer a reference bonus
0.00

DefenseStorm GRID

Let DefenseGRID experts keep watch on your behalf

  • Threat Ready Active Compliance (TRAC) Team is staffed by security experts that will help monitor your network and alert you when they see a potential threat
  • A structured and supported approach to on-boarding
  • 24/7 network monitoring
  • TRAC can make the difference between a security fire drill and a full system breach
  • Frequent, hassle-free updates without additional cost, software downloads or hardware changes
  • Pricing based on your asset size, not the amount of data ingested, so you can cover everything
  • Speed and power without the high cost of data centers, hardware and hiring additional IT resource

Key Features

  • Scalability that evolves with financial institution needs. Transforms complex and unstructured security event data from disparate systems into meaningful, actionable information
  • Community intelligence. A community of financial institutions and cybersecurity experts. Leverage community knowledge for progressively smarter cybersecurity & cybercompliance practices. Learn what like-minded thinkers have to say about keeping financial institutions safe and sound. Access our Knowledge Center for best practices and DefenseStorm GRID updates.
  • The DefenseStorm GRID: Co-Managed Threat-Ready Cybersecurity + Active Compliance. Your team and DefenseStorm’s TRAC (Threat Ready Active Compliance). Team use the DefenseStorm GRID together.Be as involved as you’d like in day-to-day activities. The TRAC Team carefully curates the threat feeds and triggers most relevant to banks and credit unions to meet compliance & security needs
  • Configured for you. TRAC leverages the DefenseStorm GRID library to create cybersecurity triggers specific to your bank or credit union network and policies.
  • See everything, prioritize what matters most. TRAC curates triggers to prioritize the most important indicators of compromise. Machine Learning and Rich Context help reduce the number of alerts and false positives while also increasing relevancy.
  • The visibility and understanding you need. You see the same console and dashboards our TRAC Team uses, which facilitates co-managed coverage and efficiency.
  • Cybersecurity & cybercompliance in one real time system of record. DefenseStorm GRID serves as your system of record for your cybersecurity and cybercompliance postures in real time, all the time. Task Schedules, workflows, audit trails and evidentiary proof reflect industry regulations as well as your own policies.
  • Slash reporting time, even for audits and examinations. The DefenseStorm GRID continuously collects all compliance-related evidence and automatically generates corresponding reports to prove compliance to internal and external stakeholders as well as regulators.
  • Guidance to align risk with cybersecurity maturity. The DefenseStorm GRID continuously guides you to align your cybersecurity risk with your Cybersecurity Maturity Level. Your Inherent Risk Profile and Maturity Levels will change as threats, vulnerabilities and operating environments change.



... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
18
10
logo
Offer a reference bonus
0.00

DXC Security Platform

Intelligence-driven security operations

Manual processes for responding to security incidents and vulnerabilities, combined with difficulty in finding and retaining security specialists, leave gaps in security programs. In fact, many organizations have an incomplete view of their security posture. DXC Technology’s Security Platform helps organizations deliver an efficient security response, streamline remediation and clearly visualize security posture. It does so by extending the cloud-based IT service management capabilities of ServiceNow to security teams. This platform combines DXC’s cybersecurity operational processes and advanced workflows together with ServiceNow to automate manual processes and prioritize threats, incidents and vulnerabilities based on their potential impact on the business. Available as a fully managed service through DXC Intelligent Security Operations, the DXC Security Platform ensures continuous monitoring and management of incidents and vulnerabilities by DXC’s 24/7 global Security Operations Centers (SOCs). DXC’s global ServiceNow practice provides consulting services and project accelerators to ensure that organizations improve efficiency and lower costs as they elevate service management to the cloud. Benefits include:
  • Correlation of information on incidents and vulnerabilities to the configuration management database (CMDB) to understand the business criticality, allowing incident responders to work on the most important issues first
  • Workflows that follow National Institute of Standards and Technology best practices for computer/IT security incident handling (NIST SP 800-61r2)
  • Automated post-incident review report that eliminates the need for manual post-mortem reports
  • Automatic triggering of a patching process, configuration changes or other standard workflows, by specific types of security incidents and vulnerabilities
  • At-a-glance dashboards that show executives and analysts the exact status of their overall security posture as well as enable drill-down to a specific incident
  • Indicators of compromise automatically linked with security incidents and vulnerabilities, streamlining and automating the  manual process of threat investigation and incident triage

Extensive collaboration capabilities

Built on proven ServiceNow applications for IT Service Management (ITSM), IT Operations Management (ITOM) and IT Business Management (ITBM), DXC’s Security Platform supports forms-based workflow application development and extensive collaboration integrated with workflows, including:

  •     Chat capabilities
  •     Content and knowledge management
  •     Task management

Through increased automation and improved collaboration, security and IT teams can work more closely to hold the entire organization accountable for solving issues quickly. These streamlined processes can help expand the capacity of security analysts and response teams to respond more efficiently to attacks and incidents. As a result, the DXC Security Platform will help reduce overall risks enterprise-wide.


Comprehensive support services


DXC offers a complete array of managed security services for cloud, traditional data center, endpoint, identity and network  management. DXC’s Security Platform can be integrated with DXC’s services:

  •     24x7 SOCs for continuous monitoring and management of incidents and vulnerabilities
  •     Cyber assurance for account and security service management
  •     Incident management team for response to user- and machine generated incidents
  •     Managed SIEM
  •     Managed vulnerability assessment
  •     Global threat intelligence
  •     Client ITSM environments, if needed (at additional cost for integration)
  •     Service Desk, if needed (at additional cost)

Why DXC?


With 40 years of experience in information security, DXC is one of the world’s few companies that provide end-to-end services to monitor and safeguard systems — from strategic consulting and technical assessments to managed security services.

Key features


Security Services Catalog and User Ticketing. Allows security teams to manage and respond to user-generated security incidents. Handles incidents raised by users over the telephone, email or the security catalog. Integrates with threat intelligence portal. Requests automation among IT, end users and security teams

Security Information and Event Management (SIEM) Integration. Allows security teams to test, execute and audit security response plans. Handles network- and non-network-related incidents. Integrates with threat intelligence portal. Requests automation among IT, end users and security team. Predefines workflows for common security incidents

Vulnerability Management. Manages vulnerability investigations and aligns remediation activities. Integrates with the National Vulnerability Database. Includes third-party integration with market-leading vulnerability identification solutions. Seamlessly integrates with incident response tasks, change requests and problem management. Predefines workflows for common security vulnerability types




... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
14
20
logo
Offer a reference bonus
1.00

Ecessa SD-WAN

Any business or entity that relies on public or private networks to operate their business. SD-WAN is the most disruptive technology to hit the telecom market in the last decade, delivering the benefits of increased bandwidth, network uptime and, in some cases, cost savings through the use of low-cost broadband connections. WHERE WE HELP
  • We help you differentiate from direct
  • We add incremental revenue streams and increase your margins with new and existing partners
  • We can be your technical experts on SD-WAN helping you be the value-added partner
  • We offer a variety of SD-WAN solutions with prices as low as $50/month
WHERE ECESSA TENDS TO WIN
  • Voice, video and VDI environments
  • SMB/SME with 1 to 500 sites are in Ecessa’s sweet spot
  • Regulated markets where data must be controlled from end-to-end, e.g. medical, banking/finance
  • Customers who need flexible networks
WHY WE ARE DIFFERENT
  • Bandwidth and carrier agnostic
  • Ecessa offers 3 unique, and upgradeable, platforms that can be mixed and matched to create the perfect solution for any environment
  • Ecessa has products that range from 60 Mbps to 20 Gbps
  • Easy to consume with both CapEx and OpEx pricing options
  • Ecessa is a premise-based solution which means all the intelligence sits on the device
  • Cloud-based SD-WAN can introduce issues with security, oversubscription, and latency
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
11
7
logo
Offer a reference bonus
0.00

ePlus Managed Security Services

Organizations are facing increasing challenges in today’s rapidly changing IT environment. With evolving technology and an environment abundant with cyber threats, new regulations and an ever-increasing talent shortage, building a strong security culture is imperative to the success of your organization. Making security pervasive across your entire IT landscape positions you for growth and success. With deep technology and engineering experience across the entire IT infrastructure, ePlus  strives to better protect our customers’ data and brand and enable positive business outcomes. ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk, empowering digital transformation, and enabling innovation. Extend the reach of your security team with expertise and around-the-clock monitoring provided by ePlus. Protect traditional and virtual IT infrastructures, cloud environments and mobile data. With multiple 24x7x365 state-of-the-art Security Operations Centers (SOCs), ePlus is able to monitor your entire security infrastructure—traditional and virtual environments as well as cloud and mobile data. They also work with a certified partner network of industry-leading managed security solution providers to deliver a suite of flexible service options, including:

  •     SOC as a Service
  •     Security Log Monitoring and Management
  •     Security Device and Vulnerability Management
  •     Managed SIEM
  •     Managed Detection and Response

With ePlus on your side, you’ll be able to assess and protect your IT footprint, better meet regulatory compliance, benefit from a consistent and reliable service provided by highly-skilled and specialized staff, and leverage powerful automated response solutions.

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
7
9
logo
Offer a reference bonus
1.40

F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData

BIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries. With a set of features that includes multicore scalability, DNS Express, and IP Anycast integration, BIG-IP DNS handles millions of DNS queries, protects your business from DDoS attacks, and ensures top application performance for users. BIG-IP DNS delivers a real-time, signed DNSSEC query response and DNS firewall services for attack protection and mitigates complex threats by blocking access to malicious domains. Works with what you already have in place. BIG-IP DNS services integrate with DNS zone management solutions, increase DNS performance at the network edge, and mask the DNS back-end infrastructure. BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms the chaotic volume of network traffic into logically assembled streams of data, and then makes intelligent traffic management decisions, selecting the right destination based on server performance, security, and availability.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
13
12
logo
Offer a reference bonus
2.00

Forcepoint Secure Enterprise SD-WAN

Forcepoint’s network security products combine the latest in software-defined wide area networking (SD-WAN) with the industry’s top-rated next-generation firewall (NGFW) security, all managed at enterprise scale from a single policy-based console. It is used by organizations of all sizes in retail, hospitality, and financial services around the globe. Forcepoint is depended upon by distributed organizations around the world to safely and efficiently connect and protect their remote stores, branches, and office buildings. Our SD-WAN technology enables sites to seamlessly use multiple connections from different ISPs, secure each of those links with the industry’s top-rated security, and manage all of it together from one console. Whether you’re a global organization that needs unified visibility and control, a growing business aspiring to have many locations, or a smaller organization that administers remote locations from a central office, Forcepoint’s enterprise-grade approach helps untangle unnecessary complexity to achieve new levels of operational efficiency. Zero-Touch Deployment Save time and money by deploying Forcepoint to remote offices and branch locations without an on-site technician. Devices can automatically download their initial configuration from Forcepoint’s Installation Cloud, eliminating the need for manual setup. Smarter Policies & Updates Forcepoint’s Smart Policies express your business processes in familiar terms, such as users, applications, locations and more. Easy grouping replaces hardcoded values, enabling policies to be dynamically reused throughout your network. Administrators can quickly update and publish policies to all affected devices, globally with a single click. Faster Incident Response Forcepoint SMC makes it easy to visualize and analyze what’s happening throughout your network.Network admins can interactively drill into the corresponding data to rapidly investigate patterns and anomalies and turn insights into immediate actions.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
11
logo
Offer a reference bonus
2.00

Fortinet FortiGate SD-WAN

As the use of business-critical, cloud-based applications and tools continue to increase, distributed organizations with multiple remote offices are switching from performance-inhibited wide-area networks (WANs) to software-defined WAN (SD-WAN) architectures. SD-WAN offers business application steering, cost savings, and performance for Software-as-a-Service (SaaS) applications, as well as unified communication services. However, SD-WAN has its own shortcomings—especially when it comes to security with direct internet access. Fortinet FortiGate Secure SD-WAN includes best-of-breed next-generation firewall (NGFW) security, SD-WAN, advanced routing, and WAN optimization capabilities, delivering a security-driven networking WAN edge transformation in a unified offering. Fortinet has received a “Recommended” rating in the first ever test conducted by NSS Labs for Software-Defined Wide Area Networking. Fortinet was ranked highly for delivering excellent quality of experience for voice and video, high overlay VPN throughput, and best price/performance. FortiGate Secure SD-WAN Product Details:
  • Best WAN Edge Price/Performance
  • WAN Path Controller with Remediation
  • Fastest Application Identification and Steering
  • Advance Routing Capabilities and WAN Optimization
... Learn more
ROI-calculator
Configurator
ROI-
-
20
9
logo
Offer a reference bonus
0.00

Genesys PureConnect (formerly Interaction Center Platform)

PureConnect, formerly called the Interaction Center Platform, integrates customer engagement functionality in one application suite. Built on a simple, all-in-one architecture, the PureConnect platform enables you to consolidate contact centre and business communications infrastructures. Because the PureConnect platform was developed on an open and standards-based architecture, it easily provides high performance for small to mid-sized businesses while integrating with external data and features. The PureConnect platform offers the broadest and deepest set of omnichannel and business communications solutions, built from the ground up to interoperate on a single platform. Because it’s based on a microservices architecture, capabilities aren’t interdependent, so a single error won’t devastate the whole system. The PureConnect platform also integrates seamlessly with all of your systems, including CRM systems from Salesforce, Oracle and Microsoft, as well as various workforce management tools and communications systems. Proven with thousands of customers, the PureConnect platform is extremely flexible and can handle any routing or team requirements.

... Learn more
-
ROI-calculator
Configurator
ROI-
-
20
7

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.