View
Sorting
Products found: 8
Defense Point Security Managed Detection and Response…
- Monitoring and analysis
- Incident Response
- Tool-based cyber threat intelligence monitoring
- Incident remediation and containment consulting
- Digital malware analysis
- Cyber Threat Emulation
- Adversarial Simulation
- Cyber Threat Hunting
- Cybersecurity Professionals – Multidisciplinary teams with diverse skillsets that work together to quickly address a wide variety of real-time threats. We recruit the industry’s best talent and invest in continuous training to help you take advantage of economies of scale.
- Established Best Practices – Our methodology encompasses both federal requirements as well as emerging best practices, accelerating our ability to detect and respond to both known and unknown threats.
- Industry-leading Technologies – Taking advantage of our global partnerships, we bring together the most innovative technologies to meet the widest array of threats and attacks. MDR is a full-stack approach that ensures attack-chain visibility for continuous endpoint monitoring, proactive threat mitigation and vulnerability protection. This integrated approach can provide more cost-effective and complete coverage. Many federal clients have reported savings of 50% or more using MDR from Accenture Federal Services.
FireEye Helix Security Platform…
FireEye Helix is a cloud-hosted security operations platform that allows organizations to take control of any incident from alert to fix. Available with any FireEye solution, FireEye Helix integrates your security tools and augments them with next-generation SIEM, orchestration and threat intelligence capabilities to capture the untapped potential of security investments. Designed by security experts, for security experts, it empowers security teams to efficiently conduct primary functions, such as alert management, search, analysis, investigations and reporting.
Advanced features that simplify and improve security:
- Threat Intelligence: Detect, enrich, explore and learn about the latest intelligence threats.
- Security Orchestration: Automate response with pre-built playbooks created by frontline practitioners.
- Next-Generation SIEM: Improve threat and vulnerability detection with advanced user behavioral analytics.
- Workflow Management: Organize, assign, collaborate and action steps through the investigative process through automated and manual workflows.
- Investigative Workbench: Index, archive and search across alert and event data from all sources across the infrastructure to support flexible pivoting and fast hunting.
- Compliance Reporting: Use and customize dashboards and widgets to visually aggregate, present and explore the most important information.
- Simplify Analysis: Collect, store and analyze event data in a single log source with custom rules and alert queues.
- Lightweight Deployment: Enable rapid, scalable, and cost-efficient deployment across cloud, on-premise, and hybrid environments.
FireEye Threat Analytics Platform is now a part of Helix
PatrowlHears…
In a nutshell, PatrowlHears provides a unified source of vulnerability, exploit and threat Intelligence feeds. Users accesses a comprehensive and continuously updated vulnerability database scored and enriched with exploit and threat news information. These metadata are collected from public OSINT and private feeds. As today, it’s one of the most extended database of exploits and vulnerabilities (with or without CVE).
PatrowlSecOps…
PatrowlManager is the Front-end application for managing the assets, reviewing risks on real-time, orchestrating the operations (scans, searches, API calls, ...), aggregating the results, relaying alerts on third parties (ex: Incident Response platform like TheHive, Splunk, ...) and providing the reports and dashboards. Operations are performed by the PatrowlEngines instances. Don't forget to install and deploy them ;)
Rapid7 insightConnect…
• Connect your existing tools
• Build automated workflows
• Set up decision points
• Improve operational efficiency With InsightConnect, your team will get more done and respond to security events faster than ever before. And with significant time savings and productivity gains across overall security operations, you’ll go from overwhelmed to operating at maximum efficiency in no time flat. Features For High-Velocity Security Operations
- Integrated and Extensible
- Human Insight When Needed
- Audit Trails at Your Fingertips
- Powerful Automation
- Benchmarks for Your Team
- Continuous Access
- Community Support
Swimlane Platform…
The Panaseer Platform…
How does Panaseer work?
- The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box Data Connectors.
- It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
- Business Risk Perspectives (BRP) capability identifies and isolates risks associated with mission-critical parts of the business, providing a continuous view of security risk aggregated and unified to any process, department, location, system or other grouping.
- Controls coverage gaps are identified by comparing internal compliance policies with the baselined inventory. Previously unidentified assets are checked to ensure controls are applied against them.
- Real-time, automated reports are produced, removing the need for manual data gathering. Security data can be mapped to your organisation’s structure, providing business context for security metrics, demonstrating investment impact and risk improvements.
Deep analysis across eight security domains
- Vulnerability Management
- Endpoint Security and Management
- Privileged Access Management
- Identity and Access Management
- Application Security
- User Awareness
- Patch Management
A single view of the entire IT estate
Panaseer provides security teams, stakeholders and other security tools with a single view of all security and IT systems, reducing the need for manual data gathering and breaking down information silos. It also automates risk prioritisation and remediation and aligns security with recognised frameworks and internal policies.UBiqube I-SOAR…
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.