Cyber Hygiene Management System

A platform-centric approach with applicable, effective tools is needed to simplify endpoint management

Cyber Hygiene Platform

HOW IT WORKS

Vulnerability Management

VULNERABILITY MANAGEMENT

Continuously identify vulnerabilities, understand the risks, exploitation potential and mitigation.

Patch Management

PATCH MANAGEMENT

Apply operating system and wide variety of third-party application patches on Windows, Linux and Mac OS X. Automate the process.

Asset Management

ASSET MANAGEMENT

Discover and manage assets. Inventory your applications and devices. Ensure their efficient usage.

Endpoint Management

ENDPOINT MANAGEMENT

Manage your endpoints and ensure their well-being. Check the health status, deploy applications, control devices.

Compliance Management

COMPLIANCE MANAGEMENT

Comply to regulatory standards benchmark and stay compliant (PCI, HIPAA, NIST 800-53, NIST 800-171)

Detection and Response

DETECTION AND RESPONSE

Detect and Respond to IoA (Indicators of Attack) and IoC (Indicators of Compromise).

A Single Platform for Comprehensive Cyber Hygiene & Reporting

SaaS Platform Server or On-Premise Server Deployment Models

Cyber Hygiene Management System

Ancor Server

The ANCOR (Analytics and Correlation) server houses vulnerability and threat intelligence, information collected from endpoints, and correlates the two to identify issues, risks and threats. The Ancor server also helps manage endpoint devices.

Viser Management Console

A web-based management console is used to monitor and manage endpoints.

Agent

A light-weight agent is installed on endpoints (Microsoft Windows, Linux and Mac OS X). It scans endpoints and interacts with servers to accomplish tasks. One agent supports all tools..

High-Value & Modular Systems Management Services

Platform queries systems to find aberrations, and helps systems to retain normality.

Vulnerability Management

  • Get continuous risk assessment without impacting system or network resource
  • Gain insight into the security posture and align the enterprise with the security policies of the organization
  • Automatically remediate risks

Patch Management

  • Identify and roll out patches automatically
  • Keep all major operating systems (Windows, Linux and Mac OS X) as well as
    third-party applications up-to-date
  • detect and fix configuration deviations,such as password polices and encryption strength

Compliance Management

  •  Achieve compliance to regulatory standards
    PCI, HIPAA, NIST 800-171, NIST 800-53
    Custom configuration standards
    Fix compliance deviations automatically to ensure organizations are continuously
    complian

Asset Management

  •  track software and hardware assets
  •  Track new installations and changes to configuration settings
  •  Manage and optimize software licenses and costs
  •  Blacklist rogue applications that show up in the inventory

Endpoint Management

  • Get visibility into the status of endpoint systems, with 100s of built-in checks
  • Gather network details and map of devices
  • Search for the presence of sensitive data,such as credit card information, social security numbers, etc.
  • Deploy software, block applications and devices

Threat Detection & Response

  • Detect Indicators of Attack (IOA) and Indicators of Compromise (IOC)
  •  Run queries to check for abnormal behavior or unusual network activity that is
    symptomatic of and attack
  •  Stop on-going attacks by blocking applications, killing processes, cleaning up
    startup folders