Monitoring and correlation of cybersecurity events within IT infrastructure:- File Integrity monitoring
- RootKit Checker
- Shell commands execution monitoring
- Scheduler Jobs monitoring
- Packets installation/removal monitoring, version control and automatic CVE-based mappings
- Executables permissions monitoring
- Monitoring of ALL AUTH events (pass/fail) across all services and endpoints with recording of source IPs, protocols and usernames
Monitoring of ALL Application log-files using standard and custom decoders with security events recognition and respective alerts tuning:- For example detection of the following types of attacks using web-server logs: SQL-injection, File inclusion, Shell Execution in URL, PHP Tags, Directory Traversal and more (detection of hundreds of web-attack types "out-of-the-box")
- PHP errors recognition
- Proxy-applications log-files monitoring
- Full monitoring of SQL queries
- System log-files monitoring with security events automatic recognition
As a result of detection of any event it's possible to automatically block the source address of the threat/attack, sign out and block the compromised user, launch any custom script on any set of managed hosts
to prevent further spread of the attack.
This functionality (SOAR - Security Orchestration, Automation and Response) provides
full protection coverage from any brute-type attacks (user enumeration, password/keys brute-force, directory traversal and more).
Regular CIS Security Benchmarks analysis for given OS:- Regular CIS Security Benchmarks analysis for given OS
- From 200 to 300 automatically verified checkpoints for every OS.
The analysis report contains the list of found vulnerabilities, their description, CVE links and elimination steps.
Log-files monitoring of the following network devices with automatic detection of cybersecurity context events:- Cisco PIX, ASA, and FWSM (all versions)
- Cisco IOS routers (all versions)
- Juniper Netscreen (all versions)
- SonicWall firewall (all versions)
- Checkpoint firewall (all versions)
- Cisco IOS IDS/IPS module (all versions)
- Sourcefire (Snort) IDS/IPS (all versions)
- Dragon NIDS (all versions)
- Checkpoint Smart Defense (all versions)
- Bluecoat proxy (all versions)
- Cisco VPN concentrators (all versions)
- Huawei USG
- pfSense
- Junos devices
- Mikrotik