Data Loss Prevention
Data Loss prevention (DLP) is a data security technology that detects potential data breach incidents in a timely manner and prevents them by monitoring data in-use (endpoints), in-motion (network traffic), and at-rest (data storage) in an organisation network.
Find data wherever it is stored
Create inventory of sensitive data
Manage data clean up
Understand how data is being used
Understand content and context
Gain visibility into policy violations
Proactively secure data
Prevent confidential data loss
Enforce data protection policies
Define unified policy across enterprise
Remediate and report on incidents
Detect content accurately
End Point Detection Response (EDR)
Endpoint detection and response (EDR) platforms are a category of endpoint security tools, built to provide endpoint visibility, and are used to detect and respond to cyber threats and exploits. Gartner’s Senior analyst Anton Chuvakin defined the term in 2013 as tools that are primarily focused on detecting and investigating suspicious activities (and traces of such) on hosts/endpoints.
Cross-correlate data across the whole environment
Combine whitelisting and blacklisting with behavioral analysis
Able to observe endpoint activity without interfering
Empower IR and forensics investigation
Enable effective clean up and remediation
Compatible with your antivirus
PacketFence is written in Perl and makes use of common open-source components, such as MySQL, Apache, Snort and Nessus. It does not require a user agent to be installed on computers accessing the network. Its deployment is non-intrusive, and every interaction with users goes through a captive portal that can be accessed by every Web browser.
PacketFence currently supports ARP, DHCP/DNS and VLAN isolation techniques. Choosing the right isolation method depends on the size of your network and the networking equipment you possess. In this article, we cover ARP-based isolation, which works on any kind of networking equipment.
Worm and virus detection
Worm/ bot detection
Pro-active vulnerability scans
Passive or in-line operation
User- directed mitigation/ remediation
Security Posture Assessment Services (SPA)
Organisations lack the visibility across Compliance & IT Risk exposure and are unable to take proactive action.
Regular compliance assessment
Enterprise vulnerability assessment
Security program assessment
Network security architecture
Application security assessment
Human based vulnerability assessment