Security

security1

no
no
Perimeter Security

Next Generation Firewalls and UTMs

Our Next Generation Firewalls (NGFWs) blend the features of a standard firewall and network Intrusion Prevention Systems (IPS), while also offering additional features such as SSL and SSH inspection, reputation-based malware filtering and Active Directory integration support. These firewalls also provide policy based application visibility, application control and threat prevention based on three unique identification technologies, App-ID, User-ID, and Content-ID.

ISIT has expertise in implementing NGFWs for many enterprise customers. We work with leading vendors in the market to ensure best-fit to customer requirements.

Intrusion Prevention Systems

ISIT’s Next-Generation IPS (NGIPS) solutions raise the bar for IPS technology by integrating real-time contextual awareness into its inspection. The system gathers information about network and host configurations, applications and operating systems, user identity, and network behavior and traffic baselines. Our NGIPS solution also offers signature and anomaly based IPS with throughput supporting 10Gbps and above for demanding server farms. By having the utmost visibility into what’s running on your network, NGIPS offers event impact assessment, automated IPS tuning, and user identification to significantly lower the total cost of ownership.

Network Access Management

ISIT’s Network Access Management solution controls access to the network. The solution can be used to validate that endpoints are properly configured and up-to-date with latest OS patches etc. In addition, our solution can manage the complexity associated with managing permissions and authorizations for various groups of users by integrating with a common directory structure, providing local authentication capabilities, or matching something on the endpoint – such as an agent or MAC address – to do the authentication before allowing access to the protected network resources. ISIT’s NAC solutions also make it easy for both IT-Issued and BYOD devices to be safely connected to the corporate network.

Malware Management

Advanced Persistent Threat Management

ISIT solution to mitigate Advanced Persistent Threats comprises of Malware analysis technology that simulates your systems to detect evasive malware, and uses custom virtual environments for faster anomaly detection. Without ever putting actual systems or applications at risk, the technology provides a map of the damage the threat would cause if allowed to run in your network, so you can contain zero-day threats and unknown malware.

From an end point perspective, the solution provides coverage against the largest attack surface for cyber-breach attacks aimed at end-users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections. It seamlessly moves the browser, PDF reader, Java, and Microsoft Office suite from the native operating system into secure virtualized environments without altering the user experience.

Portable Media Security

Portable Media Security is ISIT’s approach to securing contents of portable media such as USB, CD/DVD, smart devices and the like from becoming a carrier of Malware due to exceptions in using USB drives on end points. This integrated approach scans the contents of the media via multiple Anti-Virus engines simultaneously and detects embedded threats such as evasive malware in a custom virtual environment.

Data Loss Prevention
To protect information and prevent its loss requires technology combined with people and processes. An effective Data Loss Prevention (DLP) strategy aims to reduce the potential for data loss not only by enabling companies to deploy automated controls, but also by helping them identify risk, establish policies and processes, and educate users. ISIT recommends that organizations look at implementing a DLP strategy consisting of multiple technology components in a phased manner to close all potential gaps and exit points through which leakage of confidential data could occur. But before any technology is deployed, a process needs to be put in place that identifies where and how sensitive information is created, used, processed, moved, shared, stored and retired so it can be protected throughout its lifecycle. ISIT can assist customers to put this process in place and then enable them to deploy technical solutions that will systematically protect the confidential data.

Data Classification

ISIT’s classification solution improves the security of an organization by giving users the ability to proactively identify the data that they are producing. The tool enables easy classification and labeling of emails messages, Microsoft Office documents and other desktop documents such as PDF, CAD and jpeg files. Labels are fully customizable to meet internal and regulatory marking standards, and can be used to indicate any type of information, including data sensitivity (Public, Confidential), department (HR, Finance), and retention period (Archive for 30 Days).Users add classifications with a simple and intuitive interface that requires little or no user knowledge of regulatory marking standards.

ISIT’s Document Classification solution easily integrates into existing IT environments and enhances other infrastructure solutions, providing an excellent ROI and immediate compliance and information protection impact.

Data Loss Prevention through Deep Content Inspection

ISIT Data Loss Prevention (DLP) solution comprises of deep packet inspection tool prevents sensitive data from leaving the network perimeter or endpoints by being hidden or embedded into another file format. It safeguards data wherever it lives – on the network, in storage systems or at the endpoint. Within a short time the system gathers a wealth of information about your data use, allowing you to start building effective policies that immediately deliver value. It enforces policies for information leaving the network through email, webmail, instant messaging (IM), wikis, blogs, portals, and Web 2.0 technologies. It ensures the security of the information you know is sensitive and needs to be protected—Social Security numbers, credit card numbers, and financial data—and the information you want to protect, such as highly valuable intellectual property.

Information Rights Management

While traditional DLP/Deep Packet Inspection tools can prevent loss of sensitive information, its purpose is lost when you need to collaborate and share this sensitive information with third parties or internal employees with access to use of information for day to day business purposes.

ISIT’s Information Rights Management solution applies security mechanisms directly to the file. These protections travel with the file wherever it goes without requiring any special steps on behalf of the user. It does not matter which servers or disk drives the file resides on, which networks the file traverses through, or even what device is used to access the information; only authorized users can open and modify the file.

Security Monitoring / Management

Security Information and Event Management

ISIT’s Security Information and Event Management (SIEM) solution consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives. The solution can also correlate system vulnerabilities with event and network data, helping to prioritize security incidents.The SIEM solution provides near real-time visibility, reduces and prioritizes alerts, enables effective threat management and produces detailed data access and user activity reports.

Endpoint Security Monitoring

ISIT Endpoint Security Monitoring solution maps all the application and binary executions including the destination. With self-learning and detection of abnormal behavior you can raise the level of security risk detection and compliance on the area you need most, the end-user devices.You can also continuously monitor your end-user devices to ensure compliance enforcement of company security policy and standards (ISO 27001, PCI, etc.)

End Point Threat Detection and Response solution gives IT security operations and incident response professionals endpoint threat detection and response capabilities to detect and respond to cyber-attacks in real time. It goes beyond malware signatures with an “always-on” endpoint sensor, signature-less threat detection capabilities, and insight into the full kill chain of a security incident so that you can rapidly respond and contain each threat.

Content Management

Internet Web & Mail Gateway Content Management

Web Gateway uses proactive intent analysis to filter out malicious content from web traffic in real time. By scanning a web page’s active content, emulating and understanding its behavior, and predicting its intent, our Web Gateway proactively protects against zero-day and targeted attacks.

Web Gateway combines local protection, its powerful proactive intent analysis, with cloud-based Threat Intelligence to provide advanced protection. For both URL categorization and security-focused web reputation, choose between on premise and cloud lookups, or opt to use a combination of both for optimal protection and performance.

Our Mail Gateway solution provides the industry’s most comprehensive email security threat classification and email security management solution against phish, virus, spam emails, and other email borne malware. Enterprise emails are classified based on the level of email security threat to an organization and managed accordingly, whether it is valid email, nuisance spam, or malicious, low-volume phishing attacks. Our email security threat protection solution uses real-time email message tracing to provide the necessary security tools to triage any security threats and the email security solution is backed by an enterprise-class support organization focused on supporting your mission critical business communications.

Information Risk Management

Network/Host Vulnerability Management

Our Host Vulnerability Management solution provides complete visibility into the enterprise network including all networked devices and their associated operating systems, applications and vulnerabilities. Coupled with Network Vulnerability Management, we provide insight into potential impact (Leap frog/Waterhole attacks) of sharing a vulnerable host along with a critical production system by correlating configurations of systems sharing the network.

Risk Management

Our Enterprise Risk Management solution is an on-premise web based solution that automates the task of managing risks in an enterprise. It replaces manual tracking and risk treatment plans that are error-prone and people dependent. It is a simple and intuitive solution based on a .Net framework. It supports compliance to ISO 31000 (for compliance to high level strategic risks) and also supports ISO 27000 (for compliance to information security risks). In addition it enables compliance to internal audit findings and supports easy monitoring and tracking of remedial plans.

IT Governance, Risk and Compliance

ISIT’s IT Governance, Risk and Compliance (GRC) Solution delivers business-aware security and risk visibility so that customers are effectively able to align priorities across security, IT operations, and compliance. It automates continuous assessments and delivers a unified view of security controls and vulnerabilities. With our solution, customers are able to harden the data center, prioritize security remediation, enable the secure migration to the software-defined data center, and support continuous assessments for Cyber Security and Continuous Monitoring.

It is a modular, highly scalable, and comprehensive solution for automating security and compliance assessments across the physical and virtual data centers, and across public clouds. Our solution combines evidence from the multiple modules as well as third party systems, and maps assets and evidence to control statements, standards, and policies and regulations to enable mandate-based reporting and risk assessments. Role-based, customizable Web-based dashboards, and reports enable the organization to measure risk and track the performance of its security and compliance programs. Workflow integration with remediation ticketing systems enable organizations to align security operations with compliance and risk management operations, prioritize risk mitigation and remediation activities, and optimize security and IT operations.

Menu