ACSIADKSU4Securitas Ltd
|
Check Point InfinityCheck Point
|
|||||
Related Products
|
||||||
About
ACSIA it is a ‘post-perimeter’ security tool which complements a traditional perimeter security model. It resides at the Application or Data layer. It monitors and protects the the platforms (physical/ VM/ Cloud/ Container platforms) where the data is stored which are the ultimate target of every attacker.
Most companies secure their enterprise to ward off cyber adversaries by using perimeter defenses and blocking known adversary indicators of compromise (IOC).
Adversary pre-compromise activities are largely executed outside the enterprise’s field of view, making them more difficult to detect.
ACSIA is focused on stopping cyber threats at the pre attack phase. It is a hybrid product incorporating a SIEM (Security Incident and Event Management), Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS), Firewall and much more.
- Built for linux environments
- Also monitors Windows servers
- Kernel Level monitoring
- Internal Threat detection
|
About
Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Sysadmins, CISO, CTO, SOC Analysts in Fintech, Banking, Regulated Industries such as Pharma, Med Tech
|
Audience
Organizations in search of a consolidated security solution to reduce TCO and increase protection
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
Depends on number of servers
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationDKSU4Securitas Ltd
Founded: 2017
Ireland
4securitas.com
|
Company InformationCheck Point
Founded: 1993
United States
www.checkpoint.com/infinity-vision/total-protection-architecture/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
|
||||||
Integrations
Akamai Guardicore Segmentation
AudioCodes Software-Defined Voice Network
BlackBerry Access
Cisco Secure Malware Analytics
Cynerio
IBM MaaS360
L7 Defense
Logz.io
OneSpan Authentication Servers
Oracle Cloud Infrastructure
|
Integrations
Akamai Guardicore Segmentation
AudioCodes Software-Defined Voice Network
BlackBerry Access
Cisco Secure Malware Analytics
Cynerio
IBM MaaS360
L7 Defense
Logz.io
OneSpan Authentication Servers
Oracle Cloud Infrastructure
|
|||||
|
|
|