View
Sorting
Products found: 13
Aruba 360 Secure Fabric
Carbon Black (Cb) Defense
- 53% of breaches do not use malware. Streaming prevention goes beyond machine learning AV to stop all types of attacks before they compromise your system.
- Stop malware, ransomware, and non-malware attacks
- Prevent attacks automatically, online and offline
- Block emerging, never-before-seen attacks that other solutions miss
- 97% of organizations will be targeted by a non-malware attack. Our market-leading detection and response capabilities reveal threat activity in real time, so you can respond immediately to any type of attack.
- Continuous and centralized recording provides complete visibility into the attack
- Quickly visualize the attack chain to see exactly what attackers are trying to do
- Automated threat hunting, powered by the cloud, keeps you one step ahead of every attack
- 1 in 3 organizations will be targeted by a non-malware attack in the next 90 days. Quickly take back control with a single agent, a simple cloud console, and virtually no impact to end users.
- Deploy in 15 minutes or less, with less than 1% CPU and disk space per endpoint
- Lightweight agent won’t impact performance, keeping users happy and productive
- Effective security that balances total visibility, automated prevention, and minimal user impact
FireEye FX
FireEye NX
- Accurately detect and immediately stop attacks that evade other security devices, including file-based sandboxes
- Understand and prioritize critical alerts with reliable execution evidence and contextual insights
- Proactively defend and investigate threats with tactical intelligence from FireEye or a third party using the Structured Threat Information eXpression (STIX) format as well as contextual and strategic threat intelligence
- Deploy Network Security with integrated all-in-one hardware appliances or with a scalable and flexible on-premise or cloud-based distributed model
- Future-proof your investment with an extensible, modular architecture
- Provide your Microsoft Windows and Apple OS X users with the same level of threat protection
- Achieve quick protection with machine-, attacker- and victim-based intelligence applied as updates to your defenses every 60 minutes
- Shorten the solution payback period by eliminating the operational cost of triaging alerts manually
- Integrate and automate your security workflow to easily prioritize, investigate and respond to alerts across different threat vectors
Firemon Security Manager
Group-IB Secure Bank
- Quick and straightforward integration, that doesn't slow down your website
- Fraud prevention at early stages of attempted execution
- Secure banking solution with advanced fraud detection techniques
- Top-tier functionality and incident reporting features
- API for integration with your fraud monitoring systems
- Analytics and consulting by Group-IB experts
- Malicious injections in Internet payment systems
- Phishing attacks, social engineering attacks
- Unsanctioned remote connection and e‑banking transactions
- Malicious code for online banking fraud that involves making automatic payments or using false account details
- Employing zero-day vulnerabilities to run malicious software and intrusions
- Secure Bank mitigates online banking risks for your customers, running alongside existing IT systems. No need to have it installed on your customers’ devices.
- The script does not slow down the operation of your website.
- Secure Bank takes a proactive stand to ensure fraud prevention and detection, screening operations for any sign of malicious activities.
- Collected information goes from your bank’s IT systems to Secure Bank.
- No personal data are collected, transmitted or stored.
- Group-IB experts are up-to-date with the latest cyber threats to the banking industry in order to properly break down and rate the collected data.
Group-IB TDS — Threat Detection System
- Intrusion detection with immediate notifications on all relevant malware families
- Identification of infected devices in your organization’s wireless networks
- Incident response with manual review of critical incidents by Group-IB experts
- Top-tier usability and reporting features on detected threat
- Automated daily updates of filter rules and signatures 24/7 support through IT ticketing system
- Traffic inspection to prevent attacks and detect malware by identifying communications with Command and Control (C&C) servers, network anomalies and unusual user behavior.
- Analyzes suspicious files in Group-IB’s sandbox, Polygon, in order to identify attacks at the earliest stage.
- Advanced threat detection in your network to shield it against:
- Malicious e-mails
- Attacks on browsers
- Attacks using unknown malware or tools
- Polygon, Group-IB’s sandboxing technology, embraces machine learning and advanced data analysis techniques to handle and rate cyber security incidents.
- Identifies all information security incidents in a web-interface to give your staff an overall view of all cyber security events online.
- Suspicious incidents are analyzed by Group-IB’s SOC team and classified for your security team 24/7/365.
- A convenient ticketing system ensures that all inquiries and responses are easily tracked and addressed.
Group-IB TDS — обнаружение целевых атак
- Мгновенные уведомления об активности всех актуальных и ранее неизвестных семейств вредоносных программ
- Определение зараженных мобильных устройств сотрудников и гостей
- в Wi-Fi сетях
- Ручной анализ логов и выделение критически важных инцидентов
- экспертами Group-IB
- Удобный веб-интерфейс и наглядные отчеты о выявленных угрозах
- Регулярно обновляемый классификатор на основе данных, накопленных за 14 лет расследований и экспертиз
- Круглосуточная поддержка и консультации через удобную тикет-систему
- Оперативные уведомления о выявленных угрозах через почту и SMS
- Удобный веб-интерфейс для работы с информацией об инцидентах
- Интеграция с SIEM и системами хранения событий и логов
- Автоматическая генерация отчетов по типам атак и временным периодам
Group-IB Threat Intelligence
- Prompt attack and threat notifications for your company, clients and partners
- Direct access to compromised data and TTPs of malicious activity
- Detections, analysis and forecasts of hacking activity in the areas of your interest
- Convenient web interface for data search and analysis – no installation required
- STIX/TAXII ready, official OASIS Cyber Threat Intelligence (CTI) Technical Committee Member
- 24x7 Personal cyber intelligence analyst support: tailored reports, malware analysis and much more
- Evaluate risks, analyze statistics and assess potential damages
- Prioritize threats based on expert forecasts
- Learn attack tactics and cybercrime strategy
- Know your enemy
- Adapt your security tools and response plans
- Learn about data leaks and identify insiders
- Prevent confidential data from being sold to third parties
- Monitor hacking attacks and activity peaks correlating with your incidents
- Apply IoCs to you layered cyber security infrastructure
- Protect your clients, employees, and partners against fraud and personal data theft
- Receive attack confirmation, learn about the attack source and mechanisms used
- Prevent leakage and industrial espionage
- Effectively stop targeted attacks
- Prevent illegal use of your brand
- More than 10 patented technologies, automation and special tactics, algorithms and machine learning are helping us to collect raw data on cyber threats.
- Best analysts are making intelligence out of threat data, enriching them with context, revealing kill chains and TTPs (tactics, technics and procedures) of cyber criminals.
- Building links between incidents, IoCs and cyber criminals activities all over the world with the help of CERTs, Europol, Interpol and other international cyber crime fighters.
- Deep knowledge of Russian-speaking and international cybercriminal markets
- Adjustable amount of hours of remote analysts
- Ability to request assistance from special team of Group-IB security experts responsible for handling high-profile investigations
Group-IB Threat Intelligence (Киберразведка по подписке)
- Распределенная сеть мониторинга и HoneyNet ловушек
- Аналитика бот-сетей
- Закрытые и публичные хакерские площадки, онлайн-конференции
- Приватные группы в соцсетях
- Трекеры сетевых атак
- Данные сенсоров Threat Detection System
- Результаты криминалистических экспертиз Лаборатории Group-IB
- Мониторинг и исследование вредоносных программ
- База обращений в Центр реагирования CERT‑GIB
- Результаты поведенческого анализа вредоносных файлов с помощью машинного интеллекта
- Контакты с регисторами доменных имен и хостинг-провайдерами по всему миру
- Обмен данными с Europol, Interpol и объединениями по противодействию киберугрозам
- Целевые исследования Group-IB
- Проверка данных и сбор дополнительных сведений
- Реконструкция сценариев атак
- Исследования вредоносных программ
- Установление взаимосвязей между преступными группами
- Отслеживание трендов, формирование прогнозов
- Разработка рекомендаций по реагированию
- сведения о новых вредоносных программе или сервисах для хакерского сообщества,
- изменения в тактике проведения атак,
- утечки и продажи корпоративных данных,
- объявления о поиске инсайдеров в разных компаниях или исполнителей атак,
- обсуждение уязвимостей.
- хеш-сумму вредоносного файла,
- полное описание функциональных возможностей вредоносной программы,
- копию файла настроек или веб-инжектов,
- адреса серверов управления (C&C) и обновлений.
- учетные записи, ассоциированные с корпоративными доменами и диапазонами IP: e-mail аккаунты, доступы к intranet-ресурсам и т.д.
- номера банковских карт,
- копии ключей электронной цифровой подписи.
- дата детектирования скомпрометированной учетной записи,
- источник получения данных (серверы, адреса для управления бот-сетью),
- информация о расположении и IP зараженного пользователя,
- название и подробное описание вредоносной программы, использованной злоумышленниками,
- название преступной группы и тактика ее действий,
- фото-отчеты осмотров панелей управления бот‑сетями.
- списки целей DDoS-атак,
- cписки сайтов с размещенным фишинговым контентом,
- списки взломанных сайтов, распространяющих вредоносные программы,
- списки сайтов, подвергшихся deface-атакам.
- Для распространения вредоносных программ хакеры часто используют метод Driveby, который заключается в заражении пользователей легитимных сайтов, ни посетители, ни администраторы которого не догадываются об активности преступников. Благодаря своевременному получению данных о взломанных сайтах возможно полностью предотвратить такие атаки.
- о начале новой операции,
- о результатах успешных атак в рамках отдельной операции или независимо от нее,
- о тактике и инструментах каждой атаки,
- о связях между разными группами.
- Информация позволит взвешенно оценить риски быть атакованными в рамках определенной операции, смоделировать возможный инцидент и подготовиться к нему.
- Подозрительные IP-адреса
Gurucul Identity Analytics
Gurucul Identity Analytics (IdA) comprehensively manages and monitors identity-based risks and threats across an organization’s siloed environments. Using big data, Gurucul provides a holistic 360-degree view of identity, access, privileged access, and usage in the cloud, on mobile and on-premises. IdA reduces the access plane by detecting and removing access risks, access outliers, and orphan or dormant accounts. This improves an organization’s security posture by significantly decreasing the number of accounts that can be compromised or abused.
Identity Analytics delivers the data science that improves IAM and PAM, enriching existing identity management investments and accelerating deployments. IdA surpasses human capabilities by leveraging machine learning models to define, review and confirm accounts and entitlements for access. It uses dynamic risk scores and advanced analytics data as key indicators for provisioning, de-provisioning, authentication and privileged access management.
The impact of machine learning with Identity Analytics can radically reduce accounts and entitlements. Machine learning models provide 360-degree visibility for an identity, accounts and access, with the ability to compare to peer groups using baselines to determine normal and anomalous access. The objective is to clean up the access plane to enable access only where it should be provided.
SecurityMatters SilentDefense
- Know what's going on at all times
- Anticipate problems and threats
- Prioritize incident response and mitigation activity
- Asset inventory and network map
- Obtain full knowledge and awareness of your network through SilentDefense’s automatic asset inventory and device fingerprinting features
- Browse through the interactive network map to understand device behavior, threats and vulnerabilities
- Filter and export the information for reporting and backup
- Deployed in a matter of hours, delivers immediate results
- Connects to the SPAN/mirroring port of network switches or by using network tap technology
- Fully passive, monitors real-time network traffic without any interference or impact on the monitored environment
- Natively integrates with all major SIEM solutions, authentication servers and industrial firewalls
- Features a comprehensive API for data extraction and updates
- Its scalable architecture allows to simultaneously monitor multiple network segments and locations from a single screen
- Available both as a software or appliance-based solution
- Runs on commercial off-the-shelf hardware and hypervisors
- Form factors and sizing for appliance-based solutions vary from standard server units to ruggedized hardware depending on the monitored environment and throughput
- 15+ open OT protocols, including all smart grid and industrial automation protocols
- Proprietary protocols of all major ICS vendors
- 20+ IT protocols common to industrial environments
- Support for additional protocols is added on a continuous basis or on customer request.
TrapX DeceptionGrid platform
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.