
Information Security
Information Security Solutions
Service Centrix offers solutions from leading vendors. We provide a broad set of best industry capabilities which help our clients achieve their business and information security objectives, from strategic assessment and planning through the design, implementation and operational elements of a successful security program.
- Application Security
- Data and Content Security
- Data Backup
- Database Security
- Email Security
- Encryption
- Endpoint Security
- Mobile Security
- Network Security
- Privileged Account Security
- Privileged Session Monitoring
- Security Management
- Software Defined Perimeter
- Hardware Security Module
- Wireless Security
- Multi-Factor Authentication
Trustwave WAF
Improve Application Security and Performance:
- Real-Time Threat Detection – Identify abnormal behavior, improve threat blocking and prevent outbound data leaks.
- Ease of Use – Prioritize and respond faster and more effectively to threats with centralized management dashboards and an intuitive user interface.
- Simplified Customization – Pre-define rules and customize scenarios to focus on the specific requirements of your applications and your business.
- Features Outside of Security – Improve performance by load balancing traffic or identifying issues and trends in the web application environment.
Symantec Advanced Secure Gateway
Symantec Advanced Secure Gateway (ASG) combines the functionality of the Symantec ProxySG secure web gateway with the intelligence of Symantec Content Analysis to offer a single, powerful web security solution that delivers world-class threat protection. Advanced Secure Gateway is a scalable proxy designed to secure your web communications and accelerate your business applications. ProxySG and ASG draw on a unique proxy architecture that allows organizations to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.
- Control web and cloud usage with fast app performance
- Establish negative-day threat defense
- Implement multi-authentication realm support
- Gain visibility into encrypted web traffic
Palo Alto Networks Next Generation Firewall
- Stay on the cutting edge – Replace disconnected tools with tightly integrated innovations, like the new DNS Security
- Intel and automation to prevent attacks – Use global intelligence and automation triggered by analytics to find and stop unknown attacks instantly. Malware Analysis
- Total visibility and consistent protection – Get visibility and prevention across data center, branch, mobile and cloud, so you can protect consistently. One Console Management
- Adopt best practices for prevention – Use tools and resources that help you adopt industry best practices so you can thwart attacks in their tracks. Best Practice Assessment
Veritas
Backup Exec gives you simple, complete backup and recovery protection for your business—to cover all data wherever it resides virtual, physical and multi-cloud environments. One backup, for all your data. With the choice of up-front perpetual or subscription licensing, Backup Exec is available in three editions to best fit your needs. Bronze provides the most economic option. Silver offers the most-used features. Gold includes all the features and functionality available in Backup Exec.
- Enhance your disaster recovery strategy with full integration with Azure Site Recovery to ensure data and application availability with minimal RTO and RPO
- Benefit from advanced integration with some of the latest third-party software releases, including Microsoft® Server, Microsoft® Hyper-V and VMware® vSphere®
- Seamlessly scale Backup Exec to the cloud and choose from a range of fully tested and certified integrated cloud connectors for various cloud environments, including AWS S3, Microsoft® Azure, Google Cloud Platform Storage
- Locate and visualize your entire data estate to support General Data Protection Regulation (GDPR) and other privacy regulations, using Veritas Information Map™
- Fast end-to-end deduplication performance to on-premise storage, as well as to public and hybrid cloud to reduce time, cost and network bandwidth
Trustwave AppDetectivePRO
Database and Big Data Scanner:
- Agentless Automated Data Scanning – Discover, assess and report on the security, risk or compliance posture of any database or big data store across your environment – on-premises or in the cloud – in minutes.
- Automated Questionnaire Development – Gain the flexibility to create new data security controls or customize from existing pre-built controls based on industry standards and regulatory requirements.
- Assessment and Remediation Management – Close the loop on issues, from the initial discovery of databases and big data stores to the fixing of critical vulnerabilities or policy violations.
- Complete, Accurate and Intuitive – Automate inventory, testing, information gathering, and analysis to empower you with the intelligence needed to harden your data warehouses.
- Auditing and User Rights Review – Acquire insight into your auditors’ findings even before the audit by using the database tool most frequently used by them.
- Data Security Knowledgebase – Access extensive and continuously updated analytics and a knowledgebase of best practices, configuration settings, and vulnerabilities.
Trustwave DbProtect
DbProtect is a database security platform that uncovers database configuration, identification and access control issues, missing patches, or settings that could lead to privileges attacks, data leakage, denial-of-service or unauthorized data modification.
A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with distributed architecture and enterprise-level analytics.
Enterprise Database Security Platform:
- Virtual environment ready
- Non-disruptive agentless scan engines
- Lightweight, low-network footprint sensor technology
- No network reconfiguration needed
Trustwave Email Secure Gateway
Secure Email Gateway – Delivers a single solution that provides advanced protection against today’s email-based threats, extensive policy controls, and in-depth data security and compliance management.
- Advanced Threat Protection – Thwart malicious content and URLs and deliver real-time, zero-day protection against phishing, blended and targeted threats.
- Blended Threat Module – Ensure that when one clicks on URLs in emails, they are protected anytime and from any device.
- Management and Reporting – Acquire full visibility of your organization’s email activity through customizable reports that include types and volumes of threats, sender data and policy information.
- Data Loss Prevention (DLP) – Scan outbound emails and attachments to provide full DLP-level inspection to manage confidential data and meet stringent industry and regulatory requirements.
- Extensive Policy Controls – Implement custom policy configurations based on trigger points, content filtering and other policies for greater control.
Thales-Esecurity Vormetric
Vormetric software suite protects files, conventional and ‘big data’ databases and private data
- Encryption of databases; file systems for servers, applications and the cloud
- Transparent encryption separates administration tasks from central management of encryption keys and audits
- Protects data such as: credit card numbers, social security numbers, live data and archived data
Palo Alto Traps
Endpoint protection and response
- Stops threats on endpoints and coordinates enforcement with network and cloud security to prevent successful cyberattacks
- Combines powerful endpoint protection technology with critical endpoint detection and response (EDR)
- Enables security teams to automatically protect, detect and respond to known, unknown and sophisticated attacks.
Ivanti device control
Device and port control
To enhance productivity, you need to provide your users easy access to data, often outside the network. But the risk of opening the door to malware and data loss through devices is a real concern. Ivanti Device Control, powered by Heat, provides effective, scalable protection. Ideal for servers, fixed-function assets (e.g., POS, ATM, and pay-at-the-pump systems), and thin-client or virtualized endpoints, Device Control allows you to quickly identify and lock down endpoints to prevent unauthorised use of removable devices and ports, and to prevent unknown apps from being installed and executed—reducing your attack surface exponentially.
Ivanti application control
Application control is essential
Patching is the first step to reducing the risk of ransomware and other malware. But how do you block what you can’t patch: zero-day exploits, legacy systems, and patches that could break something in your environment? Application Control, powered by AppSense, combines dynamic whitelisting and privilege management to prevent unauthorized code execution without making IT manage extensive lists manually and without constraining users. Happy users mean help desk calls and reining in shadow IT don’t become the end all and be all of your IT team’s tasks.
MobileIron
Redefining enterprise security for the perimeter-less world with a mobile-centric, zero-trust approach.
- The zero trust approach – How do you protect data when your organization is no longer bound by traditional security perimeters? Only a zero trust approach — one that always verifies every endpoint, app, network, and user that wants to access business resources — can secure data in a perimeter-less enterprise.
- Mobile-centric, zero trust security for the perimeter-less enterprise:
- Securely provision devices – Quickly onboard and secure a vast range of employee devices coming into the enterprise.
- Grant conditional access – Ensure only trusted devices, apps, and users can access enterprise resources.
- Protect data and eliminate threats on-device – Detect and remediate threats on iOS and Android devices, with or without Internet connectivity.
- Enforce security policies – Ensure that devices, apps, users, and networks meet compliance requirements before allowing access to business apps and data.
Palo Alto Networks Next Generation Firewall
- Stay on the cutting edge – Replace disconnected tools with tightly integrated innovations, like the new DNS Security service. DNS Security
- Intel and automation to prevent attacks – Use global intelligence and automation triggered by analytics to find and stop unknown attacks instantly. Malware Analysis
- Total visibility and consistent protection – Get visibility and prevention across data center, branch, mobile and cloud, so you can protect consistently. One Console Management
- Adopt best practices for prevention – Use tools and resources that help you adopt industry best practices so you can thwart attacks in their tracks. Best Practice Assessment
Forescout
Introducing the first Unified Device Visibility for IT and OT Environments. Security starts with visibility – want to know what is on your network? We tell you what is on your network with device visibility. This visibility enables you to have 100% device inventory, ensure their compliance, control appropriate access levels and respond to security incidents.
- 100% AGENTLESS DEVICE DISCOVERY – No device agents or previous device knowledge needed. Discover and profile the ever-expanding number and types of devices connecting to your network: IoT and OT devices (passively), traditional endpoints, operating systems and virtual instances that are constantly joining your extended enterprise.
- CONTINUOUS POSTURE ASSESSMENT – The Forescout platform continuously sees these devices in incredible detail and monitors their behavior and compliance status as they come and go from the network. We continuously enforce your security policies based on changing device context.
- ABILITY TO TAKE ACTION – Starting with basic, repetitive tasks and expanding over time to more complex controls, automate control actions to free up skilled IT resources. And improve NAC, device compliance, network segmentation and incident response initiatives.
- SUPPORT FOR HETEROGENEOUS ENVIRONMENTS – The Forescout platform works with leading network infrastructure vendors and third-party security solutions. Use your preferred switches, wireless routers, firewalls or VPNs—with or without 802.1X authentication. This flexible platform also accommodates your evolving network without requiring network upgrades or vendor lock-in.
- SCALABLE AND MODULAR PLATFORM – Continuously monitor up to 2 million devices in a single deployment across campus, data center, cloud and operational technology networks. Gain visibility and network controls across IPv4 and IPv6 devices.
CyberArk
CyberArk are the Pioneers and they still Lead the Way. CyberArk is the undisputed leader in the Privileged Access Security market. Working with a market leader gives our customers the advantage of a proven leadership team, the industry’s broadest global presence and the largest and most diverse customer community.
Comprehensive functionality:
- In the Cloud – Secure privileged credentials across your hybrid cloud, IaaS, and SaaS environments and deploy CyberArk in the cloud of your choice. SECURE CLOUD WORKLOADS AND INFRASTRUCTURE
- On-premises – Secure credentials, isolate and monitor sessions, and prevent privileged attacks for your on-premises infrastructure and applications. PRIVILEGED ACCESS SECURITY SOLUTION
- At the point – Enforce least privilege, control applications, and prevent credential theft on endpoints to contain attacks and stop lateral movement. ENDPOINT PRIVILEGE MANAGER
- In DevOps – Simplify secret management with validated, ready to use CI/CD toolset integration and available as free and open source software. APPLICATION ACCESS MANAGER
Ekran System
Ekran System is an on-premises agent-based software product supporting various deployment options. Ekran system delivers monitoring and protection Clients for different types of endpoints, centralize and store data on the Ekran System Server side and provide a centralized Web-based management panel.
The Client captures user screens with mouse moves according to the recording settings and simultaneously logs important metadata such as application names, titles of active windows, keystrokes, etc. Ekran System Clients help to monitor user activity, manage access, and prevent malicious actions on any type of desktops and servers:
- Infrastructure servers,
- Terminal servers,
- Jump servers,
- Physical and virtual desktops.
Fudo Security
When you need to know and control everything within your organization
- Managing and storing passwords in a highly secure manner
- Efficiency Analyzer – gives You the most sophisticated tool to measure the productivity of Your enterprise
- Active Backup ensuring high availability of Your privileged access management solution.
- Additional layer of security with 4-eyes authentication
IBM Qradar SIEM
IBM® QRadar® Security Information and Event Management (SIEM) helps security teams accurately detect and prioritize threats across the enterprise, and it provides intelligent insights that enable teams to respond quickly to reduce the impact of incidents. By consolidating log events and network flow data from thousands of devices, endpoints and applications distributed throughout your network, QRadar correlates all this different information and aggregates related events into single alerts to accelerates incident analysis and remediation. QRadar SIEM is available on premises and in a cloud environment.
Key features:
- Ingest vast amounts of data from on-prem and cloud sources
- Applies built-in analytics to accurately detect threats
- Correlate related activities to prioritize incidents
- Automatically parses and normalizes logs
- Threat intelligence and support for STIX/TAXII
- Integrates out-of-the-box with 450 solutions
- Flexible architecture can be deployed on-prem or on cloud
- Highly scalable, self-tuning and self-managing database
Cyxtera
Secure Infrastructure for the Modern Enterprise – Modern enterprise IT is diverse, dynamic and distributed. Cyxtera is bringing together advanced cybersecurity with a global data center platform to secure and support your systems and apps wherever they run.
Accelerate Your Zero Trust Journey with AppGate SDP (Software Defined Perimeter).
- Identity-Centric – Designed around the user identity, not the IP address. AppGate SDP builds a multi-dimensional profile of a user or device and authorizes users before granting access to micro-segmented networks.
- Zero Trust Model – Leverage micro-segmentation to apply the principle of least privilege to the network. It completely reduces the attack surface.
- Built Like Cloud, For Cloud – Engineered to operate natively in cloud networks, it’s completely distributed and as scalable as the internet itself.
A Software-Defined Perimeter (SDP) architecture is made up of three primary components: a client, controller and gateway. The controller is where the brains of the system resides, acting as a trust broker for the system. The Controller checks context and grants entitlements. The controller and gateway are completely cloaked.
nCipher Security
A hardware security module (HSM) is a dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle. Hardware security modules act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys inside a hardened, tamper-resistant device.
Arista
Cognitive Wi-Fi solution
- Optimizes wireless experience
- Enabled to learn, predict and protect the wireless network
- Harnessing the power of the cloud, big data analytics, automation
- Reduces the mean-time-to-resolve problems
- Minimizes troubleshooting effort for the network
OneSpan
- INTELLIGENT ADAPTIVE AUTHENTICATION – Detect and prevent more fraud more accurately with automated analysis of countless user and device data points in real time to evaluate the risk inherent in every transaction. Then, based on the context and the associated risk, enforce the right level of authentication for that particular situation. INTELLIGENT ADAPTIVE AUTHENTICATION
- MOBILE SECURITY SUITE – Gain visibility into mobile security risks for stronger security and authentication. Establish trust in untrusted mobile environments, harden your apps against attack, and implement leading biometrics and authentication methods in the mobile channel. Easily integrate app security and authentication capabilities into existing mobile apps. MOBILE SECURITY SUITE
- MOBILE AUTHENTICATORS – Quickly configure and publish customized mobile authenticator apps for use by your customers. Customize and deploy mobile authenticator apps to the official app stores quickly and easily. OneSpan Mobile Authenticator Studio is an intuitive configuration studio for mobile authenticator apps that eliminates the need for extensive app development or in-depth technical knowledge. MOBILE AUTHENTICATORS
Let's talk about your security program
Contact us for more information