View

Sorting

Products found: 2

logo
Offer a reference bonus
0.00

Securolytics IoT Network Access Control

Features: Identify and Profile every IoT Device Securolytics IoT Tracker provides in-depth visibility through passive monitoring. We discover devices the instant they connect to your network—without requiring agents. The Securolytics ExpressForwarder™ securely COLLECTS Windows Server and network appliance logs without the need to deploy additional hardware or software. We correlate, enrich and ANALYZE data from DHCP and DNS logs to identify and profile every device and to create a baseline of normal activity. IoT Tracker then continuously monitors all devices as they communicate across your network. Detect Advanced IoT Threats Securolytics IoT Tracker is a cloud-based threat detection and analytics tool purpose-built for the Internet of Things. We address gaps in perimeter-based defenses by identifying the symptoms of a data breach, malware infection and criminal activity through behavioral analysis and anomaly detection. And we do it all without the need to deploy additional hardware or software. Unlike traditional solutions, Securolytics uses advanced statistical modeling and machine learning to independently identify new problems, learn from what it sees, and adapt over time. We reduce the effort needed to discover IoT threats inside your network. Detect IoT Compliance Violations IoT Tracker continuously runs automated policy assessments across all your connected devices searching for compliance issues. The automated tests include:
  • Restricted Devices. Personal access points or other devices that should not be connected to the network
  • Restricted Operating Systems. Devices running outdated, unsupported or vulnerable Operations Systems like Microsoft Windows 95
  • Network Hopping. Devices moving between secure corporate networks and unsecured guest networks
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
16
3
logo
Offer a reference bonus
0.00

Securolytics IoT Vulnerability Detection

Securolytics IoT Tracker provides in-depth visibility through passive monitoring.  We discover devices the instant they connect to your network—without requiring agents.  The Securolytics ExpressForwarder™ securely COLLECTS Windows Server and network appliance logs without the need to deploy additional hardware or software.  We correlate, enrich and ANALYZE data from DHCP and DNS logs to identify and profile every device and to create a baseline of normal activity.  IoT Tracker then continuously monitors all devices as they communicate across your network. Securolytics IoT Tracker is a cloud-based threat detection and analytics tool purpose-built for the Internet of Things.  We address gaps in perimeter-based defenses by identifying the symptoms of a data breach, malware infection and criminal activity through behavioral analysis and anomaly detection.  And we do it all without the need to deploy additional hardware or software.  Unlike traditional solutions, Securolytics uses advanced statistical modeling and machine learning to independently identify new problems, learn from what it sees, and adapt over time.  We reduce the effort needed to discover IoT threats inside your network. IoT Tracker continuously runs automated policy assessments across all your connected devices searching for compliance issues.  The automated tests include: 1. Restricted Devices Personal access points or other devices that should not be connected to the network. 2. Restricted Operating Systems Devices running outdated, unsupported or vulnerable Operations Systems like Microsoft Windows 95. 3. Network Hopping Devices moving between secure corporate networks and unsecured guest networks.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
6
5

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.