Filter page

Products

MOVE Antivirus

Management for Optimized Virtual Environments (MOVE) AntiVirus is optimized for protecting virtual environments such as Virtual Machines running virtualization (hypervisor) software like VMware ESX, Citrix Xen Server or Microsoft HyperV.

McAfee

McAfee

Features

McAfee MOVE AntiVirus for Virtual Servers

  • McAfee MOVE AntiVirus:
      • Multiplatform deployment
      • Agentless deployment
      • McAfee Data Center Connector for vSphere
      • McAfee ePO software

McAfee MOVE AntiVirus for Virtual Desktops

      • McAfee MOVE AntiVirus:
        • Multiplatform deployment
        • Agentless deployment
      • McAfee Data Center Connector for vSphere
      • McAfee Host Intrusion Prevention System
      • McAfee SiteAdvisor® Enterprise
      • Memory Protection, and Web Application Protection
      • McAfee ePO software

Description

Management for Optimized Virtual Environments (MOVE) AntiVirus is optimized for protecting virtual environments such as Virtual Machines running virtualization (hypervisor) software like VMware ESX, Citrix Xen Server or Microsoft HyperV.

It removes the need to install an anti-virus application on every virtual machine (VM) by offloading all scanning to a dedicated security virtual machine (SVM) so that customers get the protection they need without sacrificing performance.

McAfee MOVE AntiVirus supports agentless deployment for VMware NSX and VMware vCNS and multi-platform deployment for all major hypervisors.

Links

Data Sheet
Solution Brief
Product Guide
Case Study
ExpertCenter

Download as PDF

Endpoint Encryption

Gain control over your data by monitoring and regulating how employees use and transfer data via common channels.

McAfee

McAfee

Features

  • Gain control over your data by monitoring and regulating how employees use and transfer data via common channels, such as email, IM, printing, and USB drives—both in and away from the office.
  • Stop data loss initiated by sophisticated malware that hijacks sensitive and personal information.
  • Secure data when it’s stored on desktops, laptops, tablets, and in the cloud.
  • Manage Apple FileVault and Microsoft BitLocker native encryption on endpoints directly from McAfee ePO software.
  • Communicate with and take control of your endpoints at the hardware level, whether they are powered off, disabled, or encrypted, to halt deskside visits and endless help desk calls due to security incidents, outbreaks, or forgotten encryption passwords.
  • Prove compliance with advanced reporting and auditing capabilities; monitor events and generate detailed reports that show auditors and other stakeholders your compliance with internal and regulatory privacy requirements.

Description

All about endpoint encryption. Consists of:

  • Enterprise-Grade Drive Encryption
  • Removable Media, File and Folder, and Cloud Storage Encryption (FRP)
  • Management of Native Enctyption (MNE) – management of BtLocker (Windows) or FileVault (OS X) encryption, including reporting, managed within ePO.

These are separate products on the tech side.

Specifications

Varies per product, see data sheets.

Links

Data Sheet
Solution Brief 
Product Guide MNE 4.1 
Product Guide Drive Encryption 7.1
Product Guide FRP 5.0
Healthcare Case Study
ExpertCenter MNE
ExpertCenter FRP
ExpertCenter

Download as PDF

Data Loss Protection (DLP)

Primary focus is Data Loss Prevention, but also includes Application whitelisting and Data discovery.

Digital Guardian

Digital Guardian

Features

  • Advanced Threat Protection
    • Advanced threat detection, incident response and prevention that ensures security travels with the data
  • Data Loss Prevention
    • Everything you need to stop sensitive data from getting out of your organization
  • Data Visibility & Control
    • Out-of-the-box data visibility and device control
  • Can deploy on prem or in cloud

Description

Primary focus is DLP, but also includes Application whitelisting and Data discovery.  Considered easier to implement than competition, and very useful forensics tool. Digital Guardian for Data Loss Prevention (DLP) gives you everything you need – the deepest visibility, the fine-grained control and the industry’s broadest data loss protection coverage – to stop sensitive data from getting out of your organization.  Digital Guardian for Data Loss Prevention is consistently a leader in the Gartner Magic Quadrant for Context-Aware Data Loss Prevention (DLP).

Specification

Agents for Windows, Mac, Linux, virtual.

Links

Datasheet
Manufacturing Case Study
Case Study

Download as PDF

Multi Factor Authentication

SMS PASSCODE offers flexible policy-driven administration and protects multiple systems on a global scale. The solution seamlessly integrates to both remote access systems and cloud applications.

CensorNet

CensorNet

Features

  • More Factors Working to Your Advantage
  • Real-Time and Session-Specific
  • Advanced Attack Protection
  • High Passcode Security
  • Unmatched Reliability
  • Status Feedback
  • Flash SMS
  • MemoPasscodesTM
  • Location Aware Message Dispatching

Description

SMS PASSCODE is easy to install, deploy and manage. The platform offers  flexible policy-driven administration and protects multiple systems on a global scale. The solution seamlessly integrates to both remote access systems and cloud applications. The SMS PASSCODE platform allows you to get up and running in less than an hour. Run plug-and-play installation of the SMS PASSCODE software, setup the preferred dispatch mechanism(s), and the system is ready for use. Rollout involves no software deployment on user devices and practical training of the user group is not needed. SMS PASSCODE comes with one-click integration to Active Directory and LDAP Directories. No schema changes or extensions are required.

Specification

RADIUS VPN/SSL VPN Clients Check Point
 Cisco ASA 
Netscaler Gateway & Citrix Access Gateway (CAG)
 Juniper
 Microsoft Forefront (UAG)/Direct Access
Barracuda SSL VPN and NG rewalls
 VMware Horizon View
 Microsoft SharePoint Portal Server 1
Any other RADIUS client supporting challenge/response Palo Alto
F5 BIG-IP
NCP VPN Microsoft TMG Server & Websites

Support for Microsoft TMG published websites:

  • Outlook Web Access 2003 / 2007 / 2010 / 2013
  • Remote Desktop Web Access 
(Windows Server 2008 R2 / 2012 R2)
  • Microsoft SharePoint Portal Server
  • IIS websites using Basic or Integrated Windows 
Authentication
  • Any website not requiring Authentication Delegation 
Citrix Web Interface
  • Microsoft AD FS Protection
  • AD FS 2.0 plug-in for multi-factor authentication
  • AD FS 3.0 multi-factor authentication adapter

Transparent support for multi-factor authentication when:

  • Accessing Cloud Applications such as Saleforce.com, Microsoft Of ce 365, Google Apps etc. (AD FS 2.0/3.0)
  • Accessing websites published through the Microsoft Web
  • Application Proxy (AD FS 3.0), such as SharePoint and Outlook Web Access
  • Approving devices during workplace joins (AD FS 3.0)
  • Internet Information Services (IIS) Websites

Support for the following types of websites:

  • Outlook Web Access 2007 / 2010 / 2013
  • Remote Desktop Web Access
  • Windows Server 2008 R2 / 2012 R2)
Websites using Basic / Integrated Windows Authentication
  • Windows Logon, Remote Desktop Services

Support for the following Servers and Services:

  • Remote Desktop Services (RDP Connections)
  • Windows Servers 2008 R2 / 2012 / 2012 R2
  • Windows 7, Windows 8, Windows 8.1 and Windows 10
  • VMware Virtual Desktop Portal & Client Access

Links

Evaluation Checklist  
Beginners Guide   

Download as PDF

eDiscovery

AD eDiscovery® finds and collects needed data from the broadest range of structured and unstructured data sources of any single platform on the market.

Access Data

Access Data

Features

  • Schedule large audits of computers, network shares, and data repositories on or off the network.
  • Locate and collect key documents for analysis.
  • Apply a wide array of complex visualization, data analytics, and document review tools to quickly identify and produce key documents and prepare for a case.

Description

With an integrated, end-to-end platform covering every phase of e-discovery, corporate teams can efficiently and seamlessly conduct enterprise-wide search, targeted collection, systemized preservation, litigation hold, processing, data assessment and complete legal review, providing the reliability, predictability and efficiency required to enable your team to:

  • Mitigate Corporate Risk. Limit handoffs between vendors and technologies with a single, secure end-to-end solution and protect against spoliation, data loss and theft.
  • Ensure Compliance. Make sure data preservation needs are systematic and defensible in accordance with US and international preservation requirements for litigation, and governmental regulatory requirements.
  • Improve Response Efficiency. Rapidly access, capture and analyze information across a broad range of repositories and targets by leveraging mature and broadly adopted, forensic grade technology.
  • Lower Overall Cost. Process all potentially relevant information, structured and unstructured, inside and outside the enterprise with a single integrated solution.

Specification

AD eDiscovery® finds and collects needed data from the broadest range of structured and unstructured data sources of any single platform on the market. Using user-friendly, work flow-driven templates, AD eDiscovery performs “agentless” collections from:

  • Microsoft® Office 365 (email & calendar)
  • Google Drive • GmailTM corporate/administrator
  • Microsoft® Exchange 2003/2007/2010/2013
  • Microsoft SharePoint® 2003/2007/2010/2013
  • Oracle® URM • Druva
  • CMIS (Any data source that uses the CMIS standard)
  • IBM® Domino® • Cloud, web-based email (IMAP & POP)
  • Symantec® Enterprise VaultTM (journal/archive/files)
  • EMC® Documentum®
  • Xerox® DocuShare®
  • FileNet® repositories
  • Livelink®(OpenText®) repositories
  • WebCrawler (Web 1.0)
  • Box
Download as PDF

Services

Data Security

Data Security describes how your business protects it’s Intellectual Property or “Crown Jewels”.

Cognosec Services

Cognosec Services

Features

The service would typically involve full or part-time management of some or all of the following technologies:

  • Antimalware
  • Browser Control
  • Endpoint Encryption
  • Host Based Intrusion Prevention
  • Database Security
  • Host-based Data Loss/Leakage Prevention (DLP)
  • Cloud Application Controls & BYOD

Description

Data Security describes how your business protects it’s Intellectual Property or “Crown Jewels”. Data Security is achieved by combining various technologies at specific points on a network and configuring these to work together according to security best practice. Every company’s network will differ slightly from others, so it is important to architect the solution before implementing it. We provide a full service from consulting, gap analysis, architecture & design, implementation and management.

Specification

Remote Managed Services imply the virtual presence of our people on your premises. Our staff work remotely either as technical consultants or subject matter experts, or may perform specific operational security tasks for your company, depending on your requirements and the type of service you require. Our Remote Managed Cyber Security Service options are:

  • Retainers, where a fixed amount of hours are purchased, bundled with an SLA for a guaranteed response.
  • Full Outsource Where you fully outsource one or more of your security functions to us. We take full responsibility for the function from end to end, (this can include design, implementation, which would take place on site. Once implementation has been completed, we will remotely perform the daily management of the platform and / or the chosen solutions. This would typically include reporting, escalation, troubleshooting and upgrading.
  • Partial Outsource Where you partially outsource one or more of your security functions to us. We take partial responsibility for the function, and this work takes place remotely. This can include aspects of design, implementation,  management of a platform or solution, reporting, escalation, troubleshooting and upgrading.

Our Managed Cyber Security Services can be tailored according to your exact needs and budget. We do not subscribe to a one size fits all approach. We have developed and refined an agile framework which focuses on the successful delivery and implementation of affordable security services to all sectors of the market. Customers who adopt our framework through our managed security services make noticeable progress towards a more mature security posture in very short timeframes. This is borne out in vastly improved coverage, policies, detection rates, correlation, deduplication, escalation processes, analysis, incident response and forensic capability, reporting and visibility.

Download as PDF

Data Protection

We offer complete design, implementation, and customisation support for access-rights management systems and data leakage prevention solutions. This provides valuable information used for detecting unauthorised access events and any possible data leakages

Cognosec Services

Cognosec Services

Features

Cognosec can assist you while implementing the correct architecture to protect your data.

Network DLP

Typically a software or hardware solution that is installed at network egress points near the perimeter. It analyzes network traffic to detect sensitive data that is being sent in violation of information security policies.

Endpoint DLP

Such systems run on end-user workstations or servers in the organization. Like network-based systems, endpoint-based can address internal as well as external communications, and can therefore be used to control information flow between groups or types of users.

Data identification

DLP solutions include a number of techniques for identifying confidential or sensitive information. Sometimes confused with discovery, data identification is a process by which organizations use a DLP technology to determine what to look for (in motion, at rest, or in use).

Data leakage detection

Sometimes a data distributor gives sensitive data to a set of third parties. Some time later, some of the data is found in an unauthorized place (e.g., on the web or on a user’s laptop). The distributor must then investigate if data leaked from one or more of the third parties, or if it was independently gathered by other means.[8]

Data at-rest

“Data at rest”” specifically refers to old archived information that is stored on either a client PC hard drive, on a network storage drive or remote file server, or even data stored on a backup system, such as a tape or CD media. This information is of great concern to businesses and government institutions simply because the longer data is left unused in storage, the more likely it might be retrieved by unauthorized individuals outside the Network.[9] In order to protect this phase of data, systems use methods such as access control and data encryption.[1]

Data in-use

“Data in use” refers to active data stored in databases that the user is currently interacting with. DLP systems that protect data in-use may monitor and flag certain unauthorized activities.

Data in-motion

“Data in motion” is data that is currently traversing through a network to an endpoint destination. These networks can be internal or external. DLP systems that protect data in-motion monitor sensitive data that is being sent over a network through various communication channels such as email or IM

Description

The protection of sensitive data such as passwords, payment information, financial data, or intellectual property needs to a priority for organisations. With the establishment of security regulations such as the PCI DSS, HIPAA, and the EU Data Protection Directive, systems can be brought to a high standard of security, but the sheer number of threats targeting vital systems is dramatically increasing, so efforts towards protecting data should as well. Security breaches resulting in leaked data can become very costly to an organisation and to it’s clients should attackers get ahold of sensitive data. Cognosec can perform an assessment on the IT-infrastructure handling the data and can ensure that your sensitive data is properly managed . We offer complete design, implementation, and customisation support for access-rights management systems and data leakage prevention solutions. This provides valuable information used for detecting unauthorised access events and any possible data leakages

Specifications

The term data protection is used to describe both operational backup of data and disaster recovery/business continuity (BC/DR). A data protection strategy should include data lifecycle management (DLM), a process that automates the movement of critical data to online and offline storage and information lifecycle management (ILM), a comprehensive strategy for valuing, cataloging and protecting information assets from application/user errors, malware/virus attacks, machine failure or facility outages/disruptions.

Download as PDF

Penetration Testing

The overall objective of penetration testing is to provide an independent and reliable view of the security of the internet-facing infrastructure of an IT environment.

Cognosec Services

Cognosec Services

Features

Penetration testing is recommended annually, and in the event of major changes to your infrastructure. It is essential for companies holding intellectual property, information linked to personal identities, or financial information such as credit card data – and is often mandated by regulators. Penetration testing will help:

  • Prevent severe financial losses that could arise due to unreliable infrastructure or fraud
  • Provide the necessary proof of due diligence for regulators, customers, and shareholders
  • Protect the brand from the dreadful loss of reputation

Description

Penetration testing is a crucial element in securing your IT systems. Our team of experts can simulate an attack on multiple levels to determine whether sensitive data is at risk. The overall objective of penetration testing is to provide an independent and reliable view of the security of the internet-facing infrastructure of an IT environment. The assessment identifies weaknesses and vulnerabilities and quantifies the severity thereof – providing the information needed to address and control the threats.

Specifications

Penetration testing is a ‘mock’ or staged attack to identify vulnerabilities in information systems. Our testers, ‘white hat hackers’, put themselves in the position of someone determined to gain access to resources without knowledge of usernames, passwords and other normal means. Like a hacker or cyber criminal, they try every trick in the book, every possible plan of attack. They find the ways applications could be modified, and confidential information such as price lists or customer databases stolen or subverted. They then provide a report – explaining how they ‘broke in’ and how an organisation can avoid it happening ‘for real’.

Download as PDF