View

Sorting

Products found: 2

logo
Offer a reference bonus
0.00

NRI Secure GR360

After searching the Internet of public information, we provide corporate website repository reports, dispatching rapid security assessments, and check for phishing, malware, black lists, site vulnerability, SSL servers and certificates. Meticulous reporting includes executive summaries, base details, reports for each website and result summaries. KEEPING TRACK OF ALL YOUR WEBSITES Even for a mid-sized company, it's a tall order for a website administrator to keep an accurate corporate website repository. The problem is that regional websites are generally developed and managed by each country and business owner. GR360 simplifies the process by automatically searching all your websites and reporting directly to your administrator. REVEALING THE PUBLIC APPEARANCE OF YOUR WEBSITES We use multiple algorithms to collect and assess public information on the Internet. Based on the information, we create detailed lists of client websites, as they appear in public. DELIVERING QUICK, DETAILED SECURITY ASSESSMENTS To stop a hacker, think like a hacker. GR360 evaluates your websites from a hacker's point of view. We locate the port status that attackers typically abuse, such as FW configuration. We review software versions and check for patches. We check the configuration of SSL servers and certificates, and evaluate website reputation, maintenance and operation. ISSUING REPORTS TAILORED TO THE SPECIFIC NEEDS OF EACH MANAGER From executive summaries to individual website reports for administrators, GR360 provides the information your staff needs in the format best suited for their objectives. YOUR DATA MAY BE MORE VULNERABLE THAN YOU IMAGINE Security research conducted with GR360 on websites of global corporations based in Japan revealed the following:
  • Vulnerable Software. More than 49% of overseas websites use vulnerable software.
  • Open Ports. More than 40% of overseas websites have open maintenance ports.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
1
17
logo
Offer a reference bonus
0.00

NRI SecureTechnologies NEOSOC

NeoSOC is a cloud-based managed security solution that uses our SOC-as-a-Service delivery model to provide a flexible service ranging from security device monitoring and alerting to fully managed detection and response services based on the individual needs of each organization. NeoSOC MANAGED SECURITY SERVICES PROVIDES COMPLETE VISIBILITY Today, the challenge for many organizations is to find critical security incidents that are often lost in a sea of events. NeoSOC supports 400+ devices and applications as log sources to provide clear visibility into any security threats facing your organization. The NeoSOC VM log collector deploys in minutes and gets clients up and running quickly.
NeoSOC USES CUTTING-EDGE TECHNOLOGY TO ACCELERATE MANAGED DETECTION AND RESPONSE (MDR) NeoSOC identifies important security events by utilizing an advanced cross-device and cross-customer correlation analysis enriched by multiple streams of threat intelligence. Our analysts use Security Incident and Event Management (SIEM) technology combined with our own proprietary machine learning in a constant refinement and improvement loop to sharpen the focus even more on any new potential threats. This process dramatically reduces the number of false positives that will require investigation and enables you to focus on what really matters. NeoSOC GIVES YOU AROUND THE CLOCK MONITORING BY CYBERSECURITY EXPERTS NeoSOC provides you with 24/7 security monitoring and alerting with actionable information on any identified potential threats. Our SOC teams have exceptional knowledge, highly specialized skills, in-depth experience, and high-level security certifications. Anytime, day or night, we are always here to help you. NeoSOC managed security services help break you out of the constant cycle of trying to hire, train, and retain cybersecurity talent and will allow your current staff to focus on higher-value contextual security work.
NeoSOC USES UNIQUE THREAT INTELLIGENCE AND CAN PROVIDE PROACTIVE THREAT REMEDIATION Staying ahead of attackers requires superior intelligence. The NeoSOC platform continuously analyzes millions of events from worldwide observation points and threat intelligence feeds and integrates the results into our security monitoring and rules. Clients can choose to have our analyst alert them of critical events or NeoSOC rules can provide automated remediation utilizing our security orchestration and your existing security infrastructure. NeoSOC PERFORMS ADVANCED PERSISTENT THREAT (APT) DETECTION THROUGH CUSTOM USE CASE MODELING The detection and response to Advanced Persistent Threats (APTs) is a challenge due to the unique and complex nature of each attack. NeoSOC identifies APTs by modeling assets, users, and business use cases in your organization. This modeling process allows us to develop advanced security monitoring rules for detecting any anomalous activities on your network.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
10
1

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.