View

Sorting

Products found: 2

logo
Offer a reference bonus
1.00

CyberView

CyberView provides a simple interactive way of exploring and understanding the continuous data flow that accompanies Vulnerability Management Process, such as new vulnerability discovered and patches installed. With CyberView decisions on vulnerability risks and remediation can be understood and acted upon by Business stakeholders, IT and SOC managers to assure that Patch and Vulnerability Management process is continuously effective in your organization. “By combining the intelligence of the Qualys platform with ArcSight’s real-time correlation capabilities, we’re now able to continuously monitor and automatically detect any changes that require attention at and beyond our company’s premises,” said Maksym Iashchenko, head of the Information Technologies Infrastructure Security Unit ISS of JSC “UkrSibbank”, BNP Paribas group. “Powered by this live intelligence, we now receive valuable and prioritized information for our security team in real time. Before Cyber Operations platform, it would have taken months of dedicated developer resources, Qualys experts and ArcSight seasoned professionals to get the same results.” As we live in interconnected and Data-driven world the amount of information that needs to be processed by executives in any organization is immense already and keeps growing. CyberView leverages a Data-driven approach to make Cyber Security understandable and manageable for all stakeholders in a company including Business Executives, SOC Managers, IT and Security experts. Our platform provides an easy and understandable way to connect Processes, Procedures and People and eliminates the common gap between what is written on paper and the real picture of things. SOC Prime platform is built to easily integrate with best in class Cyber Security technologies that your organization already has and instantly boost their value. CyberView is backed by industry leading QualysGuard Vulnerability & Compliance suite’s Data. It natively integrates with the best SIEM technologies including HPE ArcSight, Splunk and IBM QRadar. CyberView provides full cycle for managing your security information solving Data Acquisition, Data Quality and Exploration challenges. Find the answers to key security questions with a real time Trend Explorer, perform retrospective analysis and leverage actionable Real time alerts that are provided in CEF, LEEF or by email. The best part? It can be deployed < 15 minutes to full production. SOC Prime provides Cyber Operations platform that empowers Enterprise, MSSP and Public organizations to proactively defend against ever-changing cyber threats. Backed by the team of cyber security professionals with combined experience of 120y+ in the industry and practical knowledge of implementing more than 50 SIEM & VM projects. SOC Prime is HPE Technical Alliance, IBM Security, Splunk and QualysGuard API Developer partner.
... Learn more
-
-
ROI-
-
19
20
logo
Offer a reference bonus
2.40

McAfee Enterprise Security Manager

Real-time visibility into all activity on systems, networks, databases, and applications

McAfee Enterprise Security Manager delivers a real-time understanding of the world outside—threat data, reputation feeds, and vulnerability status—as well as a view of the systems, data, risks, and activities inside your enterprise.

As the foundation of our security information and event management (SIEM) solution, McAfee Enterprise Security Manager delivers the performance, actionable intelligence, and real-time situational awareness required for organizations to identify, understand, and respond to stealthy threats, while the embedded compliance framework simplifies compliance.

Advanced threat intelligence

Get actionable information on all collected events with contextual information, such as vendor threat feeds and shared indicators of compromise (IOC), to deliver prioritized, actionable information in minutes.

Critical facts in minutes, not hours

Store billions of events and flows, keeping information available for immediate ad hoc queries, forensics, rules validation, and compliance. Access long-term event data storage to investigate attacks, search for indications of advanced persistent threats (APTs) or IOC, and remediate a failed compliance audit.

Optimize security management and operations

Centralize the view of your organization’s security posture, compliance status, and prioritized security issues that require investigation. Access hundreds of reports, views, rules, alerts, and dashboards.

... Learn more
ROI-
-
18
2

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.