ConfigOS

ConfigOS

SteelCloud
activeDEFENCE

activeDEFENCE

activereach
+
+

Related Products

  • Auvik
    669 Ratings
    Visit Website
  • NinjaOne
    3,904 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    119 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • Syncro
    483 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,137 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Action1
    734 Ratings
    Visit Website
  • Orca Security
    481 Ratings
    Visit Website
  • Wiz
    1,062 Ratings
    Visit Website

About

ConfigOS is currently implemented in classified and unclassified environments, tactical and weapon system programs, disconnected labs, and the commercial cloud. ConfigOS is client-less technology, requiring no software agents. ConfigOS scans endpoint systems and remediates hundreds of STIG controls in under 90 seconds. Automated remediation rollback as well as comprehensive compliance reporting and STIG Viewer Checklist output are provided. ConfigOS was designed to harden every CAT 1/2/3 STIG control around an application baseline in about 60 minutes - typically eliminating weeks or months from the RMF accreditation timeline. ConfigOS addresses Microsoft Windows workstation and server operating systems, SQL Server, IIS, IE, Chrome, and all of the Microsoft Office components. The same instance of ConfigOS addresses Red Hat 5/6/7, SUSE, Ubuntu, and Oracle Linux. ConfigOS content includes over 10,000 STIG and CIS controls. New functionality in Command Center includes a patent-pend

About

From malware to advanced persistent threats (APT) to extortion & internal breaches, threats to your organisation’s infrastructure are unrelenting. Today’s businesses must consider smartphones, tablets, and consumerization of IT, combined with telecommuters, contractors, partners, and business-critical services hosted in the cloud. Security is more important than ever—and far more complex. To defend your information and systems, you need an adaptable, multi-layered defensive strategy that encompasses all the components of your IT environment, from the network to the perimeter, data, applications and endpoints, minimising and managing the weak points and vulnerabilities that expose your organisation to risk. activereach’s end-to-end portfolio of network security solutions can protect your business from advancing threats, enhance network performance, and optimise operational efficiencies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Insititutions requiring client-less technology that requires no software agents

Audience

Security solution for organizations that helps against threat protection

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

SteelCloud
Founded: 1987
United States
www.steelcloud.com

Company Information

activereach
Founded: 2008
United Kingdom
activereach.net/solutions/network-security/

Alternatives

Alternatives

AWS Config

AWS Config

Amazon
WeConfig

WeConfig

Westermo
ConfigBox

ConfigBox

Rovexo
Trend Vision One

Trend Vision One

Trend Micro

Categories

Categories

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Compliance Features

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

AWS Marketplace
Amazon Web Services (AWS)
Box
Dropbox
Google Cloud Platform
IBM Cloud
Microsoft 365
Microsoft Azure
Rackspace
Salesforce

Integrations

AWS Marketplace
Amazon Web Services (AWS)
Box
Dropbox
Google Cloud Platform
IBM Cloud
Microsoft 365
Microsoft Azure
Rackspace
Salesforce
Claim ConfigOS and update features and information
Claim ConfigOS and update features and information
Claim activeDEFENCE and update features and information
Claim activeDEFENCE and update features and information