View
Sorting
Products found: 19
Change Tracker Gen7 R2
IT SECURITY & COMPLIANCE - PROBLEM SOLVED!
NNT’s Change Tracker™ Gen7 R2 solves IT Security and the problems that plague all organizations – the overwhelming noise of change control and ensuring the integrity of IT systems. Completely redesigned with both security and IT operations in mind, Change Tracker™ Gen7 R2 is the only solution designed to reduce change noise and the complexity of integrity monitoring and policy management all while allowing for unprecedented scalability and management that meets the most demanding enterprise environments. Gen7 R2 integrates with leading Service desks and Change Management solutions to reconcile the changes that are actually occurring within your environment with those that were expected and part of an approved Request for Change. Security and IT Service Management (ITSM) have traditionally observed and managed change in two very different ways. By linking the changes approved and expected within the ITSM world with those that are actually happening from a security perspective, SecureOps™ is delivered and underpins effective, ongoing security and operational availability.Change Tracker Features And Benefits
Automates CIS Controls Spot cyber threats, identify any suspicious changes and adjust the secure baseline for all of your systems in real-time with NNT Change Tracker™ Gen7R2. Approve changes to the authorized baseline with a simple point and click. Breach Prevention Ensure all IT assets are secure and breach free at all times by leveraging state of the art, recommended security and configuration hardening settings along with real-time system vulnerability and configuration drift management. Breach Detection Change Tracker™ Gen7 R2 identifies suspicious activity using highly sophisticated contextual change control underpinned by threat intelligence to spot breach activity while reducing change noise. Real-Time Contextual File Integrity Monitoring Change Tracker™ intelligently analyzes all changes in real-time leveraging the world’s largest repository of independently verified whitelisted files combined with intelligent and automated planned change rules to significantly reduce change noise and deliver a true FIM solution. System Hardening & Vulnerability Management Minimize your attack surface with continuous and real-time clear configuration guidance and remediation based on CIS and other industry standard benchmarks for system hardening and vulnerability mitigation guidance. Continuous Compliance Monitoring Across all Industries NNT provides comprehensive tailored or pre-built reports to provide vital evidence to security staff, management and auditors of the ongoing and improving state of your organizations secure and compliant posture.New Features and Functionality
- All new Dashboard, fully customizable with choice of widgets and multiple tabs for alternative Dashboard layouts
- ‘Single-Page Application’ design gives a contemporary, super-responsive Change Tracker experience
- New universal Query/Report controls, consistently available, enables reports to be built ‘off the page’
- New Reports Center – build and schedule any reports, with graphically-rich content, including all new Executive Report showing overall security of your estate
- ‘Expert Event Analysis’ sections for reports, with events automatically pre-analyzed to show ‘noisiest’ devices, paths, registry settings and any other monitored configuration attributes to aid decision making in your Change Control Program
- Report production now performance optimized, even large volume event reports are generated on a streamed basis to minimize impact on Hub server resources
- Report properties can be tailored – include a hyperlinked Table of Contents, Event Details table and Query Parameters, together with as many/few event attributes as required
- New Group & Device/Date & Time filter and selection control panel, selections persist for any page accessed, panel can be hidden when not in use to give a ‘full screen’ display of the Dashboard
- User-defined auto-refresh settings for all pages
- New componentized Planned Changes, allowing easy re-use of schedules and/or rulesets, driven by a new Planned
- New ‘FAST list’ planned change rule option, ensures only file changes you select as permitted, allows a user-defined list of approved file changes to be operated – like a personal FAST Cloud!
Operating at a forensic level within the IT infrastructure, Change Tracker™ works across all popular platforms such as:
- Windows, all versions including Server 2019, 2016 and Windows 10, XP, 2003/R2, Windows 7, Windows 8/8.1, 2008R2, 2012/R2 (Core and GUI)
- Linux, all versions, including Ubuntu, SUSE, CentOS, RedHat, Oracle, FreeBSD and Apple MAC OS
- Unix, all versions including Solaris, HPUX, AIX, Tandem Non-Stop
- VMWare, all versions including ESXi
- Database Systems, including Oracle, SQL Server, DB2, PostgreSQL, My SQL
- Network Devices and Appliances, all types and manufacturers, including routers, switches and firewalls, from Cisco, Nortel, Juniper, Fortinet and Checkpoint
ControlScan Managed SIEM
Gain visibility into attacks on your environment
Basic security measures are no longer sufficient to protect your business against today’s rapidly evolving cyber threats; this reality is made glaringly evident by the constant stream of breaches reported in the news. Traditional perimeter security technologies such as firewalls and Intrusion Prevention Systems (IPS)—as well as endpoint security like anti-malware—do not provide the broad and deep visibility across your IT infrastructure needed to detect these threats. Evidence of attacks and incursions within your environment can be found in log records and machine data generated by your networked systems, security devices and applications, but how do you unlock these critical insights? Most businesses struggle with the continuous investment in technology and people required to maintain ongoing monitoring of their security posture. The ControlScan Managed SIEM service combines enterprise-class SIEM technology from the ControlScan Cyphon platform with our deep security expertise and service excellence. Comprehensive service collects, correlates, analyzes and stores log data from network infrastructure, servers and applications in order to identify and mitigate security incidents while facilitating compliance with requirements within PCI, HIPAA, GLBA, SOX and other frameworks. The secure, cloud-based Cyphon platform collects log data generated by devices such as firewalls, IPS solutions, servers, desktops and applications. Correlation logic is applied to the aggregated logs to identify potential security threats, and alerts are generated and sent in real time, on a 24x7x365 basis. ControlScan Security Analysts are on hand to support the assessment and investigation of critical alerts and to provide guidance on proper response.
Key features of the ControlScan Managed SIEM Service
- Log Collection for your entire IT infrastructure
- Event Correlation and Analysis leverages multi-sourced log data and advanced correlation rule sets to detect security incidents
- Prioritization and 24 x 7 Alerting
- 12 Months of Log Retention for compliance requirements, including PCI DSS requirement 10
- Reporting and Data Access available to you through ControlScan's web-based platform
- Advance Functionality including:
- File Integrity Monitoring (FIM)
- Custom real-time dashboards
A Unique Solution to Solving the Security Challenge.
As the leader in providing cloud-based, unified security and compliance solutions, ControlScan offers unique value through its Managed SIEM service.Deploy with ControlScan and get benefits that include the following:
Security-as-a-Service – Avoid costly, up-front investments in hardware, software and technical expertise with ControlScan’s cloud-based services. You’ll be up and running quickly and effectively with an enterprise-class, scalable solution. A solution that gets better with time – Ongoing upgrades and enhancements to the Managed SIEM service ensure the addition of new capabilities for identifying evolving attack methods. At the same time, your ControlScan security team is continually creating and tuning correlation rules for your environment to ensure maximum visibility to true, critical alerts. A staff of security experts watching your back – Only the largest organizations can afford a staff of resources maintaining security and compliance day-in and day-out. ControlScan brings extensive knowledge and experience in both areas, validated by the range of IT Security, PCI and HIPAA certifications held by our team of experts. This knowledge continues to grow as threats become more advanced. A single solution for your biggest challenges – The ControlScan Managed SIEM service delivers functionality you need on three different fronts: 1) Security 2) Compliance 3) Operations. By collecting, aggregating, correlating and analyzing data from your environment, you gain visibility to your organization’s overall security posture, support for key controls in most compliance frameworks, and assurance of the health of your networked systems.Elemental Cyber Security Platform
- Improves the efficiency of security and IT staff
- Unifies visibility across IT security controls
- Supports the shift from end–point and disparate tools to a holistic and adaptive integrated solution
- Reduces network attack surface through ‘always-on’ adaptive network access control and micro-segmentation
- Provides automatic security posture assessment and adjustment
- Provides business aligned metrics to measure the compliance, value, and risk of systems
- Reduces time and cost for audits
Firemon Security Manager
Frontline.Cloud
The Frontline.Cloud™ Systems
Frontline Vulnerability Manager (Frontline VM) is the industry’s most comprehensive, accurate, and easy to use VM platform – bar none. Frontline VM comprehensively identifies and evaluates the security and business risk postures of network devices and applications deployed as premise, cloud, or hybrid network-based implementations. Now residing entirely in Amazon Web Services (AWS), Frontline VM easily addresses the security compliance requirements of organizations around the globe. Competitors’ vulnerability management software solutions may have, in fact, reached “commodity” stature – being milked for cash at the expense of continued R&D investment. Nothing could be further from the truth for Frontline VM. Frontline Active Threat Sweep (Frontline ATS), an agentless system, enhances your existing defense-in-depth coverage by uncovering gaps in your present endpoint protection, active threats and indicators of compromise. Digital Defense’s Frontline Active Threat Sweep™ (Frontline ATS™) complements your existing endpoint protection technologies providing an agentless, easy to deploy method to quickly and reliably analyze assets for active threat activity and indications of compromise. Enhance your existing defense-in-depth coverage by uncovering gaps in your existing protection. Pinpoint which assets have no endpoint protection installed or that are out-of-sync and out-of-date leaving one or more assets at risk. Frontline ATS enables organizations interested in threat hunting to deploy a threat detection capability on top of Digital Defense’s proprietary technology architecture that is lightweight and effective, to gain instant visibility into assets that demonstrate indications of compromise. Frontline Web Application Scanning (Frontline WAS) has been developed to provide the highest level of dynamic web application testing results through a system that is easily deployed and maintained. Frontline Web Application Scanning™ (Frontline WAS™), a Frontline.Cloud SaaS security system, is housed in Amazon Web Services and has been developed to provide the highest level of dynamic web application testing results through a system that is easily deployed and maintained. Enjoy the benefits of a technology you can trust to deliver unparalleled accuracy with minimal consumption of resources. Underpinned by DDI NIRV™, Digital Defense’s patented scanning technology, Frontline WAS overcomes frustrations experienced by security professionals such as the lack of accurate results and complexity found in deploying other web application scanning tools.- Easy deployment and configuration
- High level dashboards at the scan level and a per web application to easily expose overall security postures at various levels
- “Blind Spot” coverage commonly missed by other web application assessment technologies
- Prioritization of the most critical vulnerabilities, saving organizations valuable resources through targeted remediation efforts
- Tracking of and trending on new, recurred and fixed vulnerabilities
- Intuitive results navigationActive View – web application scan data management across all web application scan activities
- Robust filtering – providing the data and views you want instantly
- Dynamic reporting / visualization including OWASP Top 10
- Frontline Security GPA® trending that offers a dynamic view of your security posture
- Ability to compare Frontline VM and WAS Asset Ratings automatically, with no manual intervention required
General Electric Predix Essentials
- Monitor. View assets, operational data, metrics, and KPIs via customizable dashboards
- Analyze. Visualize and analyze data for ad-hoc investigation and root cause analysis
- Detect. Get alerts from thresholds, business rules, and machine learning analytics
- Respond. Recommend and assign actions, create cases, and track through resolution
- Centralized asset and process visibility
- Condition-based monitoring
- Remote HMI monitoring and support
- Cross-plant dashboards
- OEM fleet monitoring and service
Group-IB TDS — Threat Detection System
- Detection of complex targeted attacks at an early stage
- Prevention of financial and reputation loss
- Protection of internal networks, email, and file storage systems
- Optimisation of security processes and costs
- Alerts monitoring
- Anomaly analysis
- Threat Hunting
- Remote response
- Incident management
- Critical threats analysis
- Internal Threat Hunting
- Retrospective analysis
- Modules management
- Single interface
- External Threat Hunting
- Correlation & attribution
- Data storage
- Events analysis
- Traffic analysis
- Files extraction
- Anomalies detection
- Isolated environment
- Files analysis
- Links analysis
- Events logging
- Response at hosts
- Threats detection
Interset Platform
Connect the dots of events related to an attack. Create a prioritized list of what needs to be investigated first. Remove noise, and greatly reduce false positives, eliminating alert fatigue. Security analysts will know where to start and what to do. Interset’s precision means greater accuracy in threat detection. Respond The more context your security team, the faster they can mitigate a security incident. Interset provides a contextualized view of riskiest behaviors in your enterprise and gives your security teams the right tools to visualize and investigate incidents. Once an anomaly is detected, Interset sends actionable, easy-to-understand reports with downstream security systems to begin remediation. Main differents:
- Platform comes with a broad set of data-class support and out-of-the box analytics models, with the ability to quickly add more
- Analytic models cover more threat surfaces and visualize each stage of an attack
- Best-in-class scalability to hundreds of thousands of users
- Principled machine learning and advanced analytics engine are proven every day by our IQT partners
Ivanti Workspace Control
- Delays in providing workers access to the digital resources they need
- Inadequate definition and enforcement of access policies—especially restriction of privileges when users work from non-secure devices or locations
- Valuable IT staff time consumed by routine administration
Key Feature: Easy Workspace Personalization Workspace Control lets IT create a highly personalized user workspace for workers based on what they need to do their jobs—and what they can access based on IT and corporate policy.
Key Feature: Context Awareness Allows IT to apply the appropriate policies to each user’s desktop session, whether that session is delivered via VDI, app virtualization, or conventional thick-client architecture.
Context rules detect aspects of the user’s current state related to access policies (like location, network connection type, device type, time of day, etc.) and controls access accordingly.
Key Feature: Web-based Management Workspace Control provides IT with an easy-to-use, webbased interface for managing user and application security settings and allowing the IT helpdesk to troubleshoot the desktop configuration. Key Feature: File Certificate-based Application Whitelisting File certificates allow IT to create rules to whitelist applications from a specific vendor or product name using the certificates of signed executables—providing the same level of security as file hashes, but with fewer rules and a lot less maintenance.
Key Feature: Application Whitelist Monitor Simplifies security whitelisting across a large, dynamic application set by automating the generation and maintenance of hashes and file certificates.
Transform Digital Workspaces Ivanti Workspace Control is an ideal complement to VDI, mobility, and other digital workplace transformation strategies, since it provides an automated, policy-based way of mapping individual users to their digital workspaces across devices and delivery platforms. Users can roam seamlessly across hybrid environments for full productivity. And, because Workspace Control decouples the desktop experience from underlying infrastructure, IT upgrade projects are easier to execute and less disruptive to users.
Deliver a Consistent User Experience Workspace Control helps IT provide a consistent user experience across desktops, laptops, tablets, and smartphones—while still applying the appropriate resource limitations as workers move from office to home to the road.
Regulatory and Corporate Compliance Whether it’s meeting software licensing agreements or adhering to regulatory restrictions, Workspace Control allows IT to set, enforce, and report on granular policy rules at the user level. IT gains control over user behavior while still providing the necessary access to resources to keep users productive, plus the ability to document and demonstrate compliance.
Citrix XenApp and XenDesktop Support Workspace Control is compatible with Citrix XenApp/XenDesktop 7.15 LTSR.
Updated macOS and Linux Support The macOS and Linux agents have been updated to support the latest releases of macOS, CentOS, and Red Hat Enterprise Linux.
Ivanti Workspace Control reduces the complexity of managing the user workspace to deliver:
- A more productive and engaged workforce
- Improved corporate and regulatory compliance
- Lower cost of IT operations
- Better allocation of IT staff and skills
- Greater organizational agility
- Simplified infrastructure upgrades
Nominet NTX Platform
- Proactive real-time threat blocking designed to cut malicious activity off instantly.
- Rich APIs which allow DNS threat intelligence to be integrated into existing SIEM and management reporting systems, speeding up response times and providing intelligence for post-breach forensics.
- NTX gives you visibility and actionable threat intelligence, highlighting suspicious events and giving you the ability to respond.
- Delivered either in-cloud or on-premise, NTX cloud environments can be deployed in a matter of minutes.
- The NTX platform is built to detect malicious activity in seconds so that you can start protecting your business straight away.
- Ground-breaking technology uses unique compression, analysis and machine learning algorithms to instantly detect single malicious packets hidden in vast quantities of legitimate enterprise data, before they harm your business.
- Custom dashboards tailored to your business needs and an intuitive web control panel give you unprecedented visibility of your DNS traffic and any associated threats.
- Daily logs of blocked domains associated with threats such as malware, phishing, and data exfiltration.
- Periodic analysis of service usage and regular service management reports including identification and prioritisation of risks and vulnerabilities.
- World renowned DNS analysts with over 20 years’ experience running the .UK namespace, now a part of Critical National Infrastructure.
- Award-winning service delivery teams offering around the clock access to online documentation, expert support and dedicated account management.
- Chosen by UK Government to run DNS analytics services across the UK public sector, we are proud to be part of the Active Defence Programme run by the National Cyber Security Centre.
redBorder Intrusion
Skybox Firewall Assurance (FA)
- Analyze virtual and cloud–based firewalls to better control east–west or north–south traffic
- Detect security and compliance problems using out–of–the–box or customized policies
- Track changes for continuous firewall monitoring
- Clean up and optimize firewall rules
- Normalize firewall rulesets for a consistent view across multiple vendors
- Identify security policy violations and platform vulnerabilities on your firewalls
- Get change recommendations to fix overly permissive rules through syslog and ACL data analysis
- Analyze how network traffic could flow through a firewall
- Automate firewall management for traditional, next–gen, virtual and cloud–based firewalls
- Highlights access policy violations and provides root cause analysis
- Identifies rule conflicts and misconfigurations
- Identifies vulnerabilities on firewalls
- Incorporates compliance metrics and configuration analysis
- Supports next-generation firewall access and rule compliance at the user and application level
- Shows the relationship between IPS signatures and vulnerability occurrences on assets, helping admins configure IPS signatures correctly
- Gives fast insight to how firewall risks impact your attack surface
- Shows the relation between firewalls and zones on an interactive map
- Automates reporting for firewall ruleset audits
- Imports, combines and normalizes firewall data automatically from multiple vendors
- Automates rule recertification to streamline rulesets and ensure compliance
- Continuously monitors firewalls to eliminate security gaps
- Targets redundant, hidden and obsolete rules for cleanup and optimization
Skybox Security Suite
- Network topology (routers, load balancers, switches)
- Security controls (firewalls, IPS, VPN)
- Assets (servers, workstations, networks including traditional IT, multi–cloud and OT)
- Vulnerabilities and threats
- Vulnerability severity
- Compliance
- Age
- Location
- Exploitability
- Prevalence (density)
- Asset role
- Asset value
- Threats
- Network topology
- Security controls
- Create analytics–driven, automated processes that scale and adapt to a growing network
- Ensure firewall rules and security policies enable reliable connectivity and continuous compliance — without exposing the organization to risky attack vectors
- Streamline the creation of new firewall rules and efficiently manage rule recertification
- Perform same–day audits and simplify reporting
- Skybox® Vulnerability Control
- Skybox® Change Manager
- Skybox® Firewall Assurance
- Skybox® Network Assurance
- Skybox® Horizon
- Skybox® Research Lab
The Panaseer Platform
How does Panaseer work?
- The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box Data Connectors.
- It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
- Business Risk Perspectives (BRP) capability identifies and isolates risks associated with mission-critical parts of the business, providing a continuous view of security risk aggregated and unified to any process, department, location, system or other grouping.
- Controls coverage gaps are identified by comparing internal compliance policies with the baselined inventory. Previously unidentified assets are checked to ensure controls are applied against them.
- Real-time, automated reports are produced, removing the need for manual data gathering. Security data can be mapped to your organisation’s structure, providing business context for security metrics, demonstrating investment impact and risk improvements.
Deep analysis across eight security domains
- Vulnerability Management
- Endpoint Security and Management
- Privileged Access Management
- Identity and Access Management
- Application Security
- User Awareness
- Patch Management
A single view of the entire IT estate
Panaseer provides security teams, stakeholders and other security tools with a single view of all security and IT systems, reducing the need for manual data gathering and breaking down information silos. It also automates risk prioritisation and remediation and aligns security with recognised frameworks and internal policies.Trustwave Managed Application Control
Trustwave Managed Application Control
- Real-time Visibility & Control
- Over every endpoint and server
- No polling or network scans
- Signature-less Detection
- With built-in advanced threat indicators
- Granular, policy-based control
- Multiple server and desktop OS support
- Default Deny Policy
- Trust based and policy driven application control
- Detect-and-Deny
- Signature-less advanced threat indicators
- Detonate-and-Deny
- Automatic detonation services
Additional Benefits
- Address legacy OS concerns while meeting compliance needs within PCI or HIPAA
- Maintain best practices and ensure your policies and rules are optimally configured
- Infuse Trustwave’s extensive security expertise into your organization
- Free your internal team to focus on other security objectives
- Actionable reports and intelligence across managed servers
- Default Deny Policy
- Trust based and policy driven application control
- Detect-and-Deny
- Signature-less advanced threat indicators
- Detonate-and-Deny
- Automatic detonation services
MAC Agent Features
- Lightweight footprint
- Minimal memory usage
- Complete tamper protection
- Centralized management
- Horizontal scaling with support for up to 250,000 agents per managed platform
Supported Platforms & Use Cases
- Comprehensive OS support for Microsoft Windows, Mac OS X, and Red Hat and CentOS Linux
- Advanced server security monitoring and application control
- Point-of-Sale systems
- ATM / Banking systems
- Critical infrastructure and Health Care systems
Fully Managed, Hands Free Operation. Total solution provided by Trustwave
- Hourly event review by Trustwave SOC
- Policy enforcement action(s) by Trustwave
- As previously agreed by policy
- Audit trail of all actions taken
- Extended incident analysis / trending
- Monthly reporting
Tufin Orchestration Suite
VMware Carbon Black App Control
KEY CAPABILITIES VMware Carbon Black App Control is a powerful positive security solution for data centers and critical systems that allows server admins to control change while consolidating agents. Using a ‘Default Deny’ approach, VMware Carbon Black App Control reduces your attack surface and downtime by automating approval of trusted software and eliminating the burden of whitelist management. Lock Down Critical Systems Stop malware and non-malware attacks by preventing unwanted changes to your applications and files, providing you with the control over your environment that you need. Ensure Continuous Compliance Accelerate compliance by meeting many of the requirements in regulatory standards and frameworks, such as PCI-DSS, HIPAA/HITECH, SOX, NERC CIP, GDPR and NIST 800-53. High Performance and Low Touch Application Control Be confident that your solution is blocking the “bad” and allowing the “good” without interrupting daily operations.
BENEFITS
- Stop malware, ransomware and next-gen attacks
- Eliminate unplanned downtime of critical systems
- Consolidate endpoint agents
- Prevent unwanted change to system configuration
- Meet IT risk and audit controls across major regulatory mandates
- Increase efficiency of IT resources with streamlined IT audit processes
- Protect legacy systems running on unsupported operating systems
- App Control is now a direct control for requirement 5 of PCI DSS
FEATURES
- Application control
- File integrity monitoring and control
- Device control
- Memory protection
- Reputation services
- Open APIs
PLATFORMS
- Sensor Support:
- Windows XP, Server, Vista, Embedded, POS
- Mac OS X
- RHEL Linux
- CentOS Linux
- Oracle RHCK Linux
WatchGuard Dimension
Xabyss NetArgos
- Max 20 Gbps
- Creates Real-Time network meta data: Flow and Session
- Extract variable length session firs N packets by application
- Different N values for different applications: 0 - MAX
- Based on Packet count or Packet size
- Standart format and External export
- Security blind spot detection and elimination by periodic retroactive security analysis
- Convenient security blind spot information analysis provided by automated smart report
- Optimized network security policy
- Time and 5-tuple based information search
- Drill-down search in station,flow, packet order
- Extract and transfer the searched network information
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.