Archive for the Solution Portfolio Category

SSH.COM’s PrivX cloud access management

SSH.COM's PrivX™ is cloud access management solution. PrivX streamlines and accelerates the creation and management of SSH/RDP connections to the cloud, minimizes administrative work, allows instant secure access to the right host for developers and eliminates stolen credentials risk. The best-of-breed software for lean cloud access managementRead more

Privileged User Monitoring

Shell Control Box is a user monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise device, completely independent from clients and servers – integrating seamlessly into existing networks. SCB

Read more

Managed file transfer

Managed file transfer (“MFT”) refers to software or a service that manages the secure transfer of data from one computer to another through a network (e.g., the Internet). MFT software is marketed to corporate enterprises as an alternative to using ad-hoc file transfer solutions, such as FTP,

Read more

Privileged Activity Monitoring

Shell Control Box is an activity monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise tool with the widest protocol coverage on the market. It is completely independent from

Read more

Enterprise Fraud Management

Intellinx Intellinx is an innovative and unique software product for tracking end-user activity in internal business applications in heterogeneous platforms including legacy systems. Intellinx introduces a new dimension in auditing and fraud detection – the ability to record the interaction of all end-users with all the central

Read more

Enterprise Syslog System

Syslog-ng Premium Edition The syslog-ng Premium Edition™ (PE) logging solution allows enterprises to build a powerful, trusted and centralized logging infrastructure for reviewing and auditing log messages of over 40 platforms. With syslog-ng PE business and IT managers can easily meet compliance requirements while lowering operational costs.

Read more

Privileged Access Monitoring

Crypto Auditor CryptoAuditor is a centrally managed inline appliance or virtual appliance which has the ability to audit and review encrypted data and monitor privileged users’ activities even in encrypted environments. One of the key benefits of the CryptoAuditor is that it can be easily managed through

Read more

Intrution Prevention Solutions

Endpoint Advanced Threat Defence – Fidelis Endpoint Is your organisation looking for a solution for automating remediation and hastening the incident response process? Is your organisation looking for a solution which can prevent modern malware attacks? (For example: traditional solutions adopting whitelisting approach creates a single pointRead more

Network Access Control

Portnox access layers’ portnox™ is the first NAC product that practically checks for the most important mandatory legitimate access factor: Is the device attempting access from within the network is a known and legitimate company device? is it approved to access the network? At this point it

Read more

Web Application Firewall

WEB Insight SG WEB INSIGHT SG is a hardware-based Gateway type appliance which is configured as a proxy in the network. It is a real Web firewall solution to detect and block hacking attempts from outside and attacks in real-time which is using web application vulnerability without

Read more