Skybox Security
The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand. Centralize and enhance vulnerability management processes from discovery to prioritization and remediation. Harness the power vulnerability and asset data, as well as network topology and security controls. Use network modeling and attack simulation to find exposed vulnerabilities. Augment vulnerability data with intelligence on the current threat landscape. Know your best remediation option, including patching, IPS signatures and network–based changes.
Learn more
EventSentry
Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints.
The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events.
EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts.
Various integrations & multi-tenancy available.
Learn more
CimTrak Integrity Suite
Securing your enterprise against internal and external threats is key to meeting compliance standards and regulations. CimTrak’s change management, auditing, and reporting capabilities allow private and public companies to meet or exceed even the most rigorous compliance mandates. From PCI, SOX, HIPAA, CIS, NIST, and many more, CimTrak has you covered. File and System Integrity monitoring helps protect your critical files from changes, whether malicious or accidental, that can take down your critical IT infrastructure, threaten critical data, or cause non-compliance with regulations such as PCI. Change is inevitable in the IT environment. CimTrak delivers integrity monitoring, proactive incident response, change control, and auditing capabilities in one easy to use and cost-effective file integrity monitoring tool.
Learn more
TrapStation
TrapStation logs and forwards SNMP traps, usually to distributed management systems. You can selectively route traps, translate any SNMP version, filter, correlate events, apply thresholds, and modify varbinds. Then view graphs, search logs, and replay traps. TrapStation is a modern design, backed by decades of event-handling experience. TrapStation was designed to replace legacy apps: TrapEXPLODER, TrapBlaster, and LooperNG. Enjoy support for SNMP v3 encryption/security, trap modification, log search/replay, a browser interface, and more. And we hope you see TrapStation as a compelling alternative to unsupported scripts, or in-house development TrapStation maps incoming traps to your rule tree nodes. Each node has a filter to test traps, and options to log and forward matching traps. Nested tiers form progressively specific tests, which reduces the complexity of individual rule nodes. Nesting ensures that a partially-matched trap falls into a fail-safe rule node.
Learn more