Even though most organizations use perimeter defenses (firewalls) and employ endpoint defenses (anti-virus software), many still experience ongoing security breaches. This means that a number of internal networks remain at risk, despite their seemingly proactive defenses. In response, organizations are looking to improve their network security while ensuring compliance with policies and regulatory mandates.
Digitel's Threat Manager provides security and compliance solutions by delivering intrusion protection, vulnerability assessment and log management at a fraction of the cost of traditional products. Unlike appliance or software products, our software-as-a-service (SaaS) platform features rapid deployment, zero maintenance and no hardware or software costs.
Active Watch
- With Threat Manager, customers can greatly improve their security posture by adding Active Watch. This service provides professional security expertise, resulting in more accurate threat detection and faster, more effective incident response.
- Active Watch allows IT Managers to receive alert updates by phone or e-mail from security professionals working in the Security Operations Center (SOC). The SOC monitors the network 24/7 and follows customized escalation responses based on compliance requirements and end-user preferences. Defense, remediation and forensics support is also included.
Advanced Threat Scenario Model
- With an expanded threat-management approach that exceeds typical intrusion-detection-and-prevention products, Threat Manager allows you to maximize your technical resources by eliminating false-positive incidents and reducing associated IT costs.
Key Benefits
Threat Manager provides affordable protection for networks with no upfront investment required:
- Improve network security by identifying threats and vulnerabilities that evade perimeter and endpoint defenses.
- Achieve regulatory compliance by identifying incidents and vulnerabilities that could impact compliance-relevant network assets.
- Eliminate false alarms typically associated with intrusion-detection technology
Key Features
Intrusion Protection
- Protects against more than 12,000 identified threats
- Optional 24/7 security monitoring via SOC
- Passively monitors network traffic
- Actively blocks attack traffic based on parameters set by customer
- Correlates network events, vulnerabilities and global-threat data
- Multilayered architecture provides superior protection Vulnerability Management
- Continuous asset discovery, vulnerability assessment and resolution workflow
- Automated network topology and host discovery
- On-demand scheduling flexibility for internal and external scanning
- Comprehensive prioritization and resolution work-flow management
- Agentless architecture
- Compliance Automation
- Integrated PCI certification scanning by an Approved Scanning Vendor (ASV)
- Comprehensive compliance reporting and dashboards in PCI, GLBA, SOX and HIPAA
- Identification of incidents and vulnerabilities impacting compliance posture
"Managing your Voice and Data Network"
No comments:
Post a Comment