View

Sorting

Products found: 3

logo
Offer a reference bonus
1.90

MaxPatrol

MaxPatrol™ provides vulnerability and compliance management for all your applications, databases, network and operating systems, as well as your ERP (SAP), ICS/SCADA, Core Telecom and Banking infrastructure. MaxPatrol™ is an all-in-one vulnerability management solution trusted by over 1,000 enterprises across 30 countries. MaxPatrol™ provides agentless, low-privileged, black-box and white-box identification of vulnerabilities and configuration defects within your applications, databases, network and operating systems. With unique capabilities to cover ERP (SAP), ICS/SCADA, Core Telecom and Banking Systems, MaxPatrol™ is an all-in-one vulnerability management solution trusted by over 1,000 enterprises to maintain security and compliance. SAP Security MaxPatrol is the only solution that: Automates vulnerability and compliance management across all layers of your SAP infrastructure. MaxPatrol’s certified integration with SAP NetWeaver® 7.0, gives you control of SAP system parameters, services, vulnerabilities, SAProuter configurations, segregation of duties and so much more Provides an in-depth security assessment of core networks like ICS/SCADA, Core Telecom and Banking Systems and creates a practical attack model to illustrate where your business is at risk and outlines the steps you should take to protect it KEY BENEFITS: Core NetworksPoint Accuracy Get automated white-box and black-box analysis, security configuration assessments and detailed compliance checks across all your systems Go in-depth, to analyze system details, creating a baseline for security and eliminating false positives and false negatives Protect your critical infrastructure including ICS/SCADA, Core Telecom and Banking Systems Automate your SAP security including network infrastructure, business modules and SAP Notes, and SoD analysis Leverage the knowledge of 200 security experts who perform more than 20 large-scale penetration tests, over 200 application security assessments and discover more than 150 0-day vulnerabilities each year
... Learn more
-
ROI-calculator
Configurator
ROI-
-
18
20
logo
Offer a reference bonus
0.00

Positive Technologies Industrial Security Incident Manager

Overview

The PT ISIM hardware appliance performs non-stop monitoring of ICS network security, helps to detect cyberattacks in their early stages, identifies negligent or malicious actions by staff, and promotes compliance with cybersecurity legislation and industry regulations.
  • For small businesses
  • For larger companies
  • For ICS integrators

Quick start and scalability

A flexible mix of components makes PT ISIM easy and quick to deploy, with minimal configuration required, on infrastructures belonging to companies in any industry. Whether rapid or gradual, scaling up is always a smooth process on even the most complex networks.
  • Inventory of ICS network assets
  • Monitoring of ICS data flows
  • Detection of unauthorized system administration
  • Detection and prevention od ICS cyberattacks
  • Enhanced regulatory compliance
  • Investigation of ICS cybersecurity incidents

Non-stop protection and uninterrupted uptime

The monitoring architecture of PT ISIM is passive-only. Unlike other popular ICS security products, PT ISIM isolates ICS components from any possible interference.
  • Uniterrupted ICS operations
  • Automatic ICS network inventory
  • Pinpoint threat detection
  • Ease of deployment and scalability
  • Awareness of site and business context
  • Regulatory compliance
... Learn more
-
ROI-calculator
Configurator
ROI-
-
11
4
logo
Offer a reference bonus
1.90

PT Application Firewall

PT Application Firewall is a smart protection solution that offers a serious response to the security challenges created by web portals, ERP, and mobile applications.

Each user group — security staff, network administrators, developers, and SOC operators — has role-based access to data and the admin interface.

Highlights:

  • Focus on major threats. Correlation mechanisms reduce the number of alerts and highlight important incidents. Attack chain metrics simplify forensics.
  • Instant Blocking. Defends against “self-inflicted” vulnerabilities in custom-built software with virtual patches that protect apps until insecure code is fixed.
  • Protection against security bypass. Prevents most firewall bypass methods including HPC, HPP, and Verb Tampering.
  • Behavioral analysis against robots. Automated malware protection prevents brute-force attacks, fraud, DDoS attacks, botnets, uncontrolled indexing, and data leakage.
  • Evolving Security. Adapts to protect even the most dynamic applications that are constantly being refined and improved.

Источник: https://azuremarketplace.microsoft.com/ru-ru/marketplace/apps/ptsecurity.ptaf?tab=Overview

... Learn more
-
ROI-calculator
Configurator
ROI-
-
8
15

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.