Identity and Access Management
Identity management products are a comprehensive range of products that could help you manage, protect, store, verify, and share identity data throughout the enterprise and across extranets.
We partner with Sun Microsystems to bring your one of the best and complete identity management product that provides streamlines and simplifies the process of managing user identities across a variety of applications in order to provide provisioning and secure access, ensure ongoing compliance and enable federation for sharing beyond boundaries. And the enabling key products are Identity Manager, Directory Server, Access Manager and Federation Manager.
Identity Manager is a comprehensive user provisioning and identity auditing for efficiently and securely managing identity profiles and permissions across the enterprise and beyond. Directory Server is a secure, highly available, scalable, and easy-to-manage directory infrastructure that effectively manages identities in growing and dynamic environments. Access Manager is an Open, standards-based access control, single sign-on and federation services that help control costs and minimize the security risks of conducting business more openly.
Federation Manager is a cost effective, secure solution for federation the secure management of digital identities across corporate boundaries between partners and service providers that can scale infinitely and deploy easily to partners.
Key Products :-
dentity Manager - user provisioning and identity auditing
Directory Server - Easy to manage directory infrastructure to effectively manage identity
Access Manager - Standard based access control single sign on platform
Federation Manager - Secure Management of Digital Identities.
We distribute Symantec Messaging Security products, features industry-leading anti-spam, antivirus, and data management technologies, all integrated to protect against threats from inbound and outbound email and IM.
Symantec's Messaging Security products features integrated, best-of-breed anti-spam, antivirus, and compliance technologies that protect against threats from inbound and outbound email and IM. The world-class product helps organizations protect valuable messaging data, mitigate risks associated with data leakage, and achieve regulatory compliance. Zero-day virus prevention helps minimize downtime, while flexible workflow tools enable administrators to define effective responses to policy violations. A variety of formats, including an all-in-one security appliance, software, or a hosted solution, makes it easy to deploy and manage messaging systems. Whatever the size of your business, taking care of your most valuable asset has never been so easy.
Mail Security 8300 Series - Appliances feature integrated, best-of-breed anti-spam, antivirus, and compliance technologies to protect against threats from inbound and outbound email and IM
Mail Security for Microsoft Exchange - High-performance, integrated mail protection against virus threats, spam, and security risks while enforcing internal policies on Microsoft Exchange 2000, 2003, and 2007 servers
Mail Security for Domino - High-performance, integrated mail protection against virus threats, spam, and security risks, and enforces company policies on Domino servers
IM Manager - Seamlessly manages, secures, logs, and archives corporate IM traffic with certified support for the leading consumer IM networks and enterprise platforms
We distribute Symantec Compliance Management Products. Compliance Management Products can help organization meet its compliance requirements with products that provide proactive policy enforcement and remediation, a consolidated view of compliance to multiple regulations and standards, and automated evidence retention. Whether companies need to meet internal mandates or external regulations like SOX, industry standards such as PCI, or new federal or state e-discovery requirements, Symantec Compliance Management products helps organizations to efficiently manage their compliance program in a more repeatable, scalable, and automated manner.
Control Compliance Suite - Allows organizations to automate IT compliance processes, including policy management, assessment and remediation of IT controls, IT audit and compliance reporting.
Enterprise Security Manager - Automates the discovery of vulnerabilities and deviations in the security policies of mission critical e-business applications and servers across the enterprise from a single location.
Threat Prevention Platform
The FireEye threat prevention platform delivers multi-vector threat intelligence and partner interoperability to create a cross-enterprise protection fabric that stops today's cyber attacks. The FireEye platform enables rapid detection, validation, and response to cyber attacks that are increasingly sophisticated and successful at evading current defensive technologies. The FireEye platform has been purpose-built to counter today's cyber attacks and supplements security defenses, such as traditional and next-generation firewalls (NGFW), IPS, anti-virus (AV), and gateways, which can't stop advanced malware. The platform is formed by these core components that work in concert:
- Multi-Vector Virtual Execution (MVX) engine – A signature-less, virtualized detection engine
- Dynamic Threat Intelligence (DTI) enterprise – Multi-vector threat intelligence correlation and ecosystem of partner interoperability
- DTI cloud for global sharing of threat intelligence metadata
Multi-Vector Virtual Execution (MVX) engine
FireEye Virtualized Detection Model
The core of the FireEye platform is the patented MVX engine, which provides dynamic, signature-less, and virtualized analysis of today's advanced cyber attacks. The MVX engine can be deployed across attack vectors and detonates suspicious files, Web pages, and email attachments within instrumented virtual machine environments to confirm a cyber attack. After confirming an attack, the MVX engine also dynamically generates threat intelligence about the indicators of compromise specific to this attack and the targeted enterprise. This intelligence is multi-vector in nature and in a standards-based format, which enables the intelligence to be correlated and shared among the entire FireEye deployment and partner ecosystem for automated validation and protection against today's cyber attacks.
Dynamic Threat Intelligence enterprise Threat Prevention Model
Enterprise Threat Intelligence Sharing
FireEye has created a new threat prevention model featuring multi-vector threat intelligence, which is enterprise-specific to provide in-depth, cyber attack life cycle protection against unknown and known attacks as well as targeted, APT attacks. With FireEye, organizations have real-time threat prevention against blended attacks, malicious URLs, and spear phishing campaigns used to bypass traditional security. By correlating the multi-vector dynamic threat intelligence for a particular enterprise, customers can block attacks, respond to validated infected systems, and automatically share the indicators of compromise throughout the entire FireEye deployment and partner ecosystem technologies. The actionable FireEye threat intelligence enables customers to better leverage their existing infrastructure and achieve greater security ROI.
Standards-based threat intelligence metadata enables flexible, interoperability options for customers to gain stronger security, automated rapid response, and leverage their existing infrastructure. Partner integrations utilize the FireEye threat intelligence to address the network visibility, endpoint validation, and enforcement options needed by today's organizations to automate key cyber security workflows. Today's integrations use the FireEye XML-based alert format that provides rich threat intelligence to the alliance partner's solution enabling such activities as quarantining of infected IP addresses, restricting ports and protocols used by the malware, and infection confirmation based on the malware MD5 hash, for example.
Dynamic Threat Intelligence cloud Enables Global Sharing of Threat Intelligence
Global Threat Intelligence Sharing
The FireEye Dynamic Threat Intelligence cloud interconnects FireEye platforms deployed within customer networks, technology partner networks, and service providers around the world. This worldwide cloud efficiently shares the anonymized, standards-based threat intelligence metadata. The metadata format enumerates malware attributes, actions, and forensics captured in the FireEye MVX engine, such as covert callback channels, as well as new threat findings from FireEye Labs. By exchanging anonymized threat intelligence through the DTI cloud, participants gain contextual visibility of global attacks and can strengthen their collective security with the latest threat intelligence and neutralize attacks before they cause catastrophic damage.
Advanced persistent threat (APT) actors continue to innovate and utilize sophisticated malware exploits to bypass traditional security. Data theft, cyber espionage, system sabotage, and data corruption are some of the scenarios occurring today in targeted APT attacks.
The FireEye platform features the following integrated products, the NX series, EX series, FX series, and AX series. The FireEye CM series, which unifies reporting, configuration, and threat data sharing, centrally manages the overall FireEye platform deployment. Each platform can connect directly, or via a CM, into the Dynamic Threat Intelligence cloud, which offers global threat data sharing to stop emerging, zero-day threats. Learn more about FireEye Platform.
FireEye relevant videos
We distribute Symantec's Security Management Products. Symantec Security Management products automate key processes and provide visibility into an organization security posture.
Symantec Security Management products helps organizations manage IT security environments through a broad portfolio of products security management products that link policies to processes such as incident response, threat/vulnerability management, security information/event management, and database security.
Key Products :-
Security Information Manager - Provides comprehensive incident response to help organizations identify, prioritize, and respond to threats.
Database Security - Provides real-time threat detection and auditing, thereby reducing risks of fraud and data leakage while addressing compliance requirements
Intrusion Prevention Systems
Most Intrusion Prevention Systems (IPS) can block known threats during the attack at the perimeter. However, that is not enough anymore. More and more attacks and risks are emerging from inside the network. Nor can network security professionals continue to patch the problem with another software package. Organizations need an intrusion prevention process one that will prevent network threats before, during, and after an attack.
Our partnership with SourceFire, bring the best of New Generation IPS , the Sourcefire 3D System. SourceFire 3DSystem is a new generation network security platform with an intelligent, unified defense system that is :-
- Comprehensive - integrating threat, endpoint, and network intelligence. SC Magazine compared it to 11 other IPS solutions and recognized it as the most comprehensive - and the best value.
- Highly automated - giving context for smarter, better decisions and automation when needed.
- Policy driven - the Sourcefire 3D System offers a multi-level, integrated approach that ensures thorough compliance enforcement and documentation.
- Infrastructure agnostic - allowing existing investments to be leveraged and not locking customers into one approach.
And our partnership with AirTight Networks, bring a range of AirTight Networks products enable that enterprises and service providers to easily plan, secure and monitor their wireless LAN network. Whether a small business with one or two access points, an enterprise with hundreds of access points or a service provider with thousands of sites around the globe, AirTight Networks has products that gives you visibility, manageability and instantaneous protection of your network.
Key Products :-
Sourcefire IPS provides vulnerability-based intrusion prevention built on the foundation of Snort, the world's most popular intrusion prevention software.
Sourcefire RNA - Always-on, real-time view of what is transpiring in a user's network and identifies potential vulnerabilities on these devices.
Sourcefire Defense Center - Unifies critical network security functions including event monitoring, correlation, and prioritization for forensic analysis, trends analysis, and management reporting.
SpectraGuard Enterprise - A complete wireless intrusion prevention system that automatically identifies and blocks WLAN security threats
SpectraGuard Planner - Wireless LAN Planning for Coverage, Performance and Security
We distribute Symantec range of EndPoint Security Products from Symantec. Symantec's Endpoint Security products offers proven, world-class protection without added resource burden, so your organization can efficiently manage security for all its endpoints and gain confidence that corporate assets and business operations are protected all while controlling costs.
Symantec Endpoint Security products, protects against known and unknown threats and allows administrators to enforce security policies on laptops, desktops, servers, and mobile devices. Advanced threat protection technologies such as antivirus, antispyware, firewall, intrusion prevention, and device control combined with network-independent access control provide unprecedented security for systems and networks.
- Reduce the risk of exposure to external threats and insider attacks.
- Minimize complexity by standardizing on a single vendor for endpoint protection and compliance.
- Increase the control and manageability of endpoint assets.
- Reduce the potential for unmanaged machines gaining access to the network.
- Ensure that endpoints connecting to your network have met minimum security requirements.
- Increase confidence that business assets and operations are properly secured.
Key Products :-
EndPoint Protection - Delivers unparalleled defense against malware in a single agent by combining Symantec AntiVirus with advanced threat prevention for laptops, desktops, and servers.
Network Access Control - Increases security, network availability, and regulatory compliance by enabling enterprises to enforce security settings and software running on the hosts connected to their enterprise networks.
Critical System Protection- Hardens systems, helps maintain security policy compliance, and uses behavior-based host intrusion prevention technology to protect against zero-day attacks.
On-Demand Protection for Outlook Web Access - Prevent the exposure and data loss of sensitive information that reside in email such as company financials, customer information, and intellectual property.