ConfigOSSteelCloud
|
||||||
Related Products
|
||||||
About
ConfigOS is currently implemented in classified and unclassified environments, tactical and weapon system programs, disconnected labs, and the commercial cloud. ConfigOS is client-less technology, requiring no software agents. ConfigOS scans endpoint systems and remediates hundreds of STIG controls in under 90 seconds. Automated remediation rollback as well as comprehensive compliance reporting and STIG Viewer Checklist output are provided. ConfigOS was designed to harden every CAT 1/2/3 STIG control around an application baseline in about 60 minutes - typically eliminating weeks or months from the RMF accreditation timeline. ConfigOS addresses Microsoft Windows workstation and server operating systems, SQL Server, IIS, IE, Chrome, and all of the Microsoft Office components. The same instance of ConfigOS addresses Red Hat 5/6/7, SUSE, Ubuntu, and Oracle Linux. ConfigOS content includes over 10,000 STIG and CIS controls. New functionality in Command Center includes a patent-pend
|
About
Tychon is an advanced endpoint analytics and remediation platform designed to provide comprehensive visibility and control over enterprise endpoints. It enables organizations to search, visualize, remediate, and monitor security compliance across all endpoints within a unified interface. Key features include real-time monitoring, historical data tracking, and rapid query capabilities, allowing for instant identification of threats and vulnerabilities. It offers dynamic dashboards that provide insights into critical cybersecurity violations and a centralized view of vital security areas. Tychon supports compliance with various standards, including STIG, CVE/IAVA, and endpoint protection, and integrates seamlessly with existing investments. It is lightweight and serverless, deploying through Intune/MECM, and is designed to operate in both cloud and on-premises environments.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Insititutions requiring client-less technology that requires no software agents
|
Audience
Government agencies and defense contractors looking for a tool to enhance endpoint security and compliance without introducing additional infrastructure
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationSteelCloud
Founded: 1987
United States
www.steelcloud.com
|
Company InformationTYCHON
Founded: 2017
United States
tychon.io
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Compliance Features
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
||||||
Integrations
AWS Marketplace
Axonius
Cortex XSOAR
Elastic Cloud
Forescout
Microsoft Sentinel
ServiceNow
Splunk Cloud Platform
Tenable Cloud Security
ThreatQ
|
Integrations
AWS Marketplace
Axonius
Cortex XSOAR
Elastic Cloud
Forescout
Microsoft Sentinel
ServiceNow
Splunk Cloud Platform
Tenable Cloud Security
ThreatQ
|
|||||
|
|
|