IAM
CXO Quotation…
“IAM has been around for years but I have yet to see a tool that is easy to implement and intuitive to use. One that feels more like a business support solution rather than a cyber-security tool."
To be used in what Circumstance
To consider in any organization willing to implement SSO, to provide a controlled and secured access to its business applications.
High-Level Description
A modern, feature-rich and user-friendly IAM platform, very stable and very easy to integrate even in enterprises with a very diverse application landscape with multiple directories, and for a workforce distributed in multiple locations.
* All features are available for on-premise and in-cloud versions. *
PAM Platform
CXO Quotation…
“I need to control the access to key assets of my data centre & NW, but my tools are hard to integrate and fragmented… I need a scalable, user-friendly & unified platform!"
To be used in what Circumstance
To consider in any organization, data centre, that is concerned about security breaches and heightened control, especially of privileged accounts.
*Best in class for Telco. *
High-Level Description
"Protect What You Connect": a cyber security tool in the field of Privileged Access Management (PAM), to efficiently manage and monitor secure access to any platform, device, or network element through a single & centralized platform (agentless by default).
It is particularly effective for organizations requiring very high scalability, with wide assets distribution and a need to manage it "all in one box".
*Unique in offering PAMaaS for data centre security; rich in features, all included in single platform and license (time/geo fencing, session mgmt. and monitoring, Dynamic password controller, TACACS+ and Radius integration, etc.)*
Soft OTP
CXO Quotation…
“One-time-password is unpopular because it’s not user-friendly… And on top of it, it’s not 100% secure. I need a niche solution to address that need without going overboard with a full cyber security suite."
To be used in what Circumstance
To consider for businesses dependent on secure online transactions, in need of a Soft OTP solution as a seamless MFA-based mechanism for secure login.
High-Level Description
An embedded solution to replace the SMS OTP code sent for 2nd authentication to customers. It eliminates security loopholes and improves customer experience.
It includes all features and functions required for a secure digital login, digital transaction signing, and document signing.
Secure Digital Onboarding
CXO Quotation…
“A fully digitalized business means it should be possible to onboard customers without physical exchange of documents. In some regulated industries that's a challenge..."
To be used in what Circumstance
To consider for businesses in need of solutions to support the acquisition and onboarding process of new customers, entirely online and paperless.
By extension, the platform also supports use cases such as password recovery, authorization of risky transactions, product subscriptions, video banking, etc.
High-Level Description
An AI-based digital onboarding product that enables companies to gain customers from anywhere in the world, in minutes. It provides businesses the necessary capabilities to do digital onboarding, following a highly flexible and customizable process.
Next to Identity verification by OCR & NFC (multiple ID's supported), Face verification & liveness check, it also features a secure video call infrastructure. Customers can also digitally sign contracts via their mobile phones.
* KYC *
Security platform for endpoint,
SW asset & inventory mgmt.
CXO Quotation…
“I need to have deep inspection in my organization's SW assets, control statuses, force upgrades, lock stations! Is there one single product to help with such practical operations?"
To be used in what Circumstance
To consider in enterprises that need to control and apply its security policies, manage its IT inventories, and secure all its end points from a single control station.
*Horizontal cut through the capabilities of several vertical global products, with a very practical focus on operational needs. *(well-known among security specialists).
High-Level Description
A security platform for endpoint control and monitoring, as well as for SW asset and inventory mgmt. Coverage includes computers, servers and network devices in corporate networks, independent of operating systems (Windows, Linux, Mac).
Assets can be effectively grouped, reported on, and controlled remotely through misc. interventions, script execution, scheduled routines, etc. It can also integrate with other enterprise security solutions where necessary (SIEM, vuln. scanners, ticketing, etc.).
*Patch mgmt., policy mgmt., log collection & monitoring, inventory mgmt., vulnerability mgmt., antivirus mgmt., process mgmt., etc. *
Cyber Security Training for SOC
CXO Quotation…
“My cyber security experts go to classroom trainings, listen to a nice instructor and sip coffee... This is not gonna turn them into combat-ready soldiers!"
To be used in what Circumstance
To consider in any organization wishing to entrust their IT to motivated, experienced, alert and hardened cyber-security professionals.
High-Level Description
A bootcamp-like training program prioritizing hands-on practice and simulation over classroom content and "classic" teaching.
Graduates become excellent SOC analysts & threat hunters, develop both technical offensive and defensive skills and investigative methodologies.
Crowd-sourced Pen. Testing
CXO Quotation…
“Penetration tests don’t dig deep enough, because of time & team limits. The model is not right… Alternative services based on crowd-sourcing provide much better results, much faster."
To be used in what Circumstance
To consider in any organization concerned with remaining vulnerabilities in their cyber defence, and keen on a process with transparent reporting and transparent fees.
High-Level Description
A service that implements penetration tests through a coordinated crowd-sourcing effort with registered freelance security researchers and a system of rewards as an incentive. These help discover, verify and report deep-rooted cyber security vulnerabilities on a much larger scale.
PCI & SWIFT Certification
Permitted References (Collective)