Supercharge your

revenue stream

Get your clients IT security sorted with quality products backed by excellent services and support.

What we are all about

Since opening our doors in 1998 we learned that being a leader in the IT Security Market requires the right strategy, the best team and an excellent supporting structure. Although these components are important, to be a leader in any market is determined by the way you lead by serving.

 

At Netxactics we work to lead by example, by serving the channel and our customers with passion, integrity, excellence and innovation. We will never claim to be perfect, but we will always stay in the game and remain committed to making sure end results are met.

What we do

Products

Sales

Services

Marketing

Our products are of the highest quality because we believe each client should get the quality they expect when it comes to IT security.

Our readily available account managers will assist with any sales queries, product or services quotes. We believe in long term sustainable relationships that enable business continuity and growth.

Our products are backed by excellent service and support. Our team is dedicated, qualified and experienced to assist with each of our products. We cover all the bases, from deployment right up to a remote support and reporting.

We offer marketing support to our partners through the creation of email campaigns, and marketing essentials for various applications.

"Love what you do and you'll do it well."

Products

 

 

 

 

 

NETWORK

XG Firewall

The Next Thing in next-gen:

 

Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed to the way they report information and how they work with other security systems around them, giving you an unprecedented level of simplicity, insight, and advanced threat protection.

 

With an interface designed to eliminate unnecessary complexity, it enables you to use the powerful features without needing to become an IT security expert.

 

 

SG UTM

The Ultimate Network Security Package

 

With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to provide optimal performance, versatility, and efficiency to meet all your security needs.

 

The Sophos SG Series appliances are designed to provide the optimal balance between performance and protection – for diverse IT environments. Whether you need a solution for a small remote office, want to protect your school campus, or are a global organisation requiring high-availability and enterprise-grade features, our SG Series appliances are an ideal fit.

 

 

Secure Wi-Fi

Super secure super Wi-Fi

 

Sophos Wireless provides a simple, effective way to manage and secure your wireless networks. Managed from Sophos Central, it is easy to deploy as a standalone product or as part of your portfolio of cloud-managed solutions.

 

  •     Sophos Wireless managed from Sophos Central
  •     One dashboard for an at-a-glance status
  •     Simple deployment and administration
  •     Increased visibility and control
  •     Secure guest access and hotspot setup
  •     Multi-site management and cloud scalability

 

 

Secure Web Gateway

Complete web protection.

 

Sophos Web Gateway

  •     Reliable, globally-deployed cloud infrastructure
  •     Enterprise-grade Secure Web Gateway that’s advanced yet easy to use
  •     Manage all your Sophos Central security from one unified console
  •     Fast Lane technology that can speed up web browsing

 

The web is the number one source of threats, with 80% of them coming from legitimate, trusted sites. Sophos Web Gateway provides security, visibility, and control for all your desktop PCs, Macs, Chrome books, and mobile devices, regardless of how or where they access the web. And you get the simple, elegant management experience that is Sophos Central.

 

 

Secure Email Gateway

Simple protection for a complex problem

 

Sophos Email

  • Fast setup and easy integration
  • Proven anti-virus, anti-Spam, and anti-phishing
  • Email continuity with an end-user, self-service portal; spooling; and emergency inbox
  • Reliable, global Sophos-hosted infrastructure
  • Manage alongside endpoint, the web, and wireless in Sophos Central’s unified console

 

Sophos Email is a secure email gateway engineered to keep businesses safe from all email threats. It simply stops spam, phishing, malware and data loss and keeps your people productive. And if you want to consolidate protection it lets you control email security alongside endpoint, mobile, the web, and wireless protection from Sophos Central’s single interface.

 

 

 

XG FIREWALL DATASHEET

SG UTM DATASHEET

SECURE WI-FI DATASHEET

SECURE  WEB DATASHEET

SECURE  EMAIL DATASHEET

ENDUSER & SERVER

Endpoint Protection

Comprehensive security for users and data

 

Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and advanced threats, such as targeted attacks. Our next-generation endpoint protection integrates innovative technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. We also add web filtering, application control, device control and more right into the lightweight endpoint agent, so your organisation’s policies are enforced anywhere your users go.

 

 

Intercept X

A completely new approach to endpoint security

 

Sophos Intercept X adds next-generation signature-less technologies on top of your current endpoint security to give you complete, layered protection.

 

Sophos Intercept X uses multiple layers of technology, allowing you to create your own tailored next-generation endpoint security solution.

 

  •     Protect Vulnerable Software
  •     Effective Ransomware Detection
  •     Root Cause Analysis
  •     Add Next-Gen Protection to Your Traditional Security
  •     Simplify Management and Deployment

 

 

Mobile Control

Countless devices, one solution

 

Your users are accessing corporate data on their personal mobile devices more and more. However, this creates management and security challenges. Sophos Mobile Control allows you to keep your users productive while securing all of those different mobile devices with minimal IT effort.

 

  •     Mobile Content Management
  •     Mobile Device Management
  •     Mobile Application Management
  •     Mobile Email Management

 

 

SafeGuard Encryption

Protecting your data, wherever it goes

 

Sophos SafeGuard encrypts content as soon as it is created. The encryption is always on, allowing for seamless and secure collaboration. Synchronised Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data. This method of always-on protection goes everywhere your data goes, making it the most comprehensive data security solution on the market.

 

 

Server Protection

Security optimised for servers

 

Sophos Server Protection protects your server environment from malicious attacks while keeping your servers running at optimum performance. Designed to secure business critical servers, Sophos Server Protection includes server application white-listing, advanced anti-malware, and behaviour analysis. It’s server security made simple, providing protection for your Windows, Linux, and UNIX systems, and optimised for virtual environments.

 

  •     Better protection
  •     High-performance security built for servers
  •     Simple to use, including one-click Server Lockdown
  •     Cloud or on-premise management
  •     Security for every platform

 

 

Phish Threat

Reduce your largest attack surface

— your end users

 

A solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.

 

Phish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.

 

 

Sophos Home

Free protection for home computers

 

Sophos Home protects every Mac and PC in your home from malware, viruses, ransomware, and inappropriate websites. It uses the same award-winning technology that IT professionals trust to protect their businesses. Best of all, you can manage security settings for the whole family from any browser.

 

MOBILE SECURITY DATASHEET

SAFEGUARD DATASHEET

SERVER PROTECTION DATASHEET

MOBILE CONTROL DATASHEET

ENDPOINT PROTECTION DATASHEET

INTERCEPT X DATASHEET

PHISH THREAT DATASHEET

Rapid7 products make your data more productive, unlocking answers you can use to remediate vulnerabilities, detect breaches, enhance IT operations, and more. How? They collect operational data from across your entire ecosystem - logs, endpoints, everything - then apply real-time analytics powered by an unmatched understanding of attackers and IT operations. It’s a process that transforms your data into insight, prioritises it based on your business objectives, and helps coordinate workflow to resolve the problem.

 

 

insightVM

Live vulnerability management and endpoint analytics

 

The modern network is no longer comprised simply of servers and desktops; remote workers, cloud and virtualization, and mobile devices mean your risk exposure is changing every minute. Utilizing the power of Rapid7’s Insight Platform and the heritage of our award-winning Nexpose solution, InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize your risk.

 

Collect

Automatically collect, monitor, and analyze vulnerabilities on your network.

Prioritise

View real-time risks and leverage custom views tailored to your users.

Remediate

Provide IT with the data they need to fix quickly, then track progress in real-time.

INISIGHTVM DATASHEET

metasploit

Penetration testing software to help you act like the attacker

 

Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilising an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

Uncover Weaknesses

Find your vulnerabilities with

automated penetration tests powered by the world’s largest

exploit database.

Maximise Impact

Test and harden your people,

processes, and technology in

order of potential impact on

risk reduction.

Remediate Faster

Test your security program to

identify and more quickly fix

exposures.

METASPLOIT DATASHEET

appspider

Web application security testing to close the gaps in your apps

 

SPAs, APIs, mobile—the evolution of application technology is measured in months, not years. Is your web application security testing tool designed to keep up? AppSpider lets you collect all the information needed to test all the apps so that you aren’t left with gaping application risks.

 

The dynamic application security testing (DAST) solution crawls to the deepest, darkest corners of even the most modern and complex apps to effectively test for risk and get you the insight you need to remediate faster. With AppSpider on your side (or, rather, all of your sides), you’ll be able to scan all the apps today and always be ready for whatever comes next.

 

Keep Pace

Collect the info needed to test today’s ever-evolving apps.

Reduce Risk

Reduce risk with every build and remediate earlier in the SDLC.

Play Nice

Hand deliver the right insight the right way to DevOps.

APPSPIDER DATASHEET

insightIDR

Transform your data into actionable insight

 

Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.

Unify SIEM, UBA, and EDR

Augment reach across your entire ecosystem to find intruders early and get more from existing investments.

Detect Attacks Earlier

Detect intruders earlier in the attack chain so you can respond before critical data is compromised.

Prioritise Your Search

Uncover insight that is hidden in user activity, logs, and endpoints,

to make investigations

20x faster.

INSIGHTIDR DATASHEET

insightOPS

Your operations centre for endpoint visibility and infrastructure analytics.

 

InsightOps combines live endpoint visibility with log analytics, creating one console for total

infrastructure awareness.

Centralize Your Data

Easily centralize data from across your infrastructure in one secure location.

Search and Ask

Search logs and ask questions of your endpoints for immediate results.

Find Answers

Find answers with relevant context that enables you to solve problems fast.

INSIGHTOPS DATASHEET

Logentries

Centralized Logging. Simple and Free.

Logentries’ centralized logging service takes only minutes to setup and is free to use. Centralize logs from multiple sources and search using a simple query builder.

Collect & Centralize

Stream logs from all environments into Logentries’ centralized log server in real-time.

 

 

Search & Analyze

Search using basic keywords or our advanced query language for deeper analysis.

 

 

Visualize & Report

Build charts, graphs and alerts to monitor performance, user behavior and more.

 

API & Integrations

 

 

Open Source Extensions

Enjoy a large library of open source agents, libraries and other tools for extending Logentries’ logging server to meet your needs.

 

 

RESTful APIs

Logentries’ set of APIs makes it easy to leverage Logentries’ centralized logging service in whatever way works best for you.

DOWNLOAD A FREE TRIAL

SECURE PASSWORDS

 

Secret Server Privileged Account Management from Thycotic

Secret Server enables you to store, distribute, change, and audit enterprise passwords in a secure environment

 

  • Manage and Organise
  • Seamless Integration
  • Essential Compliance
  • Real-Time Management
  • Top-Level Security
  • Disaster Recovery

 

Secret Server On-premise

Secret Server on-premise enables you to Detect, control, distribute, Change, and audit passwords in a secure environment.

 

Secret Server Cloud

Privileged account password management software for IT Admins and IT Security Pros Automatically manage and secure your sensitive privileged passwords in minutes – with the power and affordability of the cloud.

 

 

Password Reset Server for Active Directory and Office 365 accounts

Your enterprise-level password reset solution

 

  • Secure Identity Verification
  • Windows Logon Integration and Web Portal
  • AD Attribute Maintenance
  • Custom Security Policies
  • Automated or Custom Enrollment
  • Section 508 Compliant

 

THYCOTIC OVERVIEW

THYCOTIC PAM DATASHEET

ENDPOINT PRIVILEGED ACCESS SECURITY SUITE

Proactive IT security from Thycotic to secure passwords, protect endpoints and control access

 

Why Security Professionals and IT Admins Love it

  • Only comprehensive yet simple multi-layered protection against ransomware and advanced threats
  • Easiest to manage, integrated security for endpoints and privileged account passwords
  • Enforces least privilege policies, and password best security practices without impacting productivity
  • Saves time and reduces help desk calls

 

Thycotic blocks cyber security attacks with multiple layers of security:

Keep attackers off endpoints

Stop malicious applications and Unix commands from running with Windows application white-listing, black-listing, and flexible greylisting. Now, you only give elevated privilege for approved applications and commands.

Enforce least privilege for everyone

Eliminate the ability for malware to run by automatically enforcing least privilege for everyone on your network through group policy. Reduce attack vectors by automatically finding and fixing OS configuration issues.

Protect privileged credentials

Discover, secure, and manage the use of privileged account passwords, continuously rotating passwords to prevent abuse. Monitor all privileged

password activity and alert for unusual behaviours or potential

PROTECT ENDPOINTS & CONTROL ACCESS

 

Privilege Manager for Windows

Privilege Manager for Windows protects your vulnerable endpoints with effective yet flexible application access control

Assures Comprehensive Application Control

Controls what apps can be installed, which can run with elevated access, and who gets appropriate privileges, for strong endpoint protection.

 

Simplifies Your Tasks

Gives you the simplest to use, easiest to manage and most flexible application control solution.

 

Speeds Time to Value

Provides rapid application discovery and policy templates that speed time to value and make privilege management a breeze.

 

Implements Least Privilege

You can assure least privilege access across applications without interfering with IT admin or employee productivity.

 

Demonstrates Compliance

Built in reports, such as applied policies or access approvals, help you meet compliance requirements for PCI, NIST, NERC CIP, SOX and more.

 

Integrates with Secret Server

Combining Thycotic’s endpoint security software with our leading privileged account password  software, you get complete multi-layered protection of your privileged credentials and endpoints.

Privilege Manager for Unix

Enhance your Secret Server security by enforcing least privilege on Unix/Linux root admin accounts!

Ensure privileged accounts are more secure by enforcing least privilege policies for Unix superusers without impacting their productivity.

 

 

Minimise the risk of data breaches and insider abuse associated with unauthorised access to, or escalated privileges of, Unix superuser accounts.

 

 

Demonstrate compliance with security policies and regulations by showing auditors that superuser privileges are effectively managed, monitored, controlled, and secure.

 

 

Save time and money by significantly reducing help desk calls and minimising Unix admin account management issues.

 

 

Enable Unix administrators to centrally manage and provision Unix accounts that are linked to AD.

 

 

Understand and prove to auditors what users are authorised to do with  root credentials.

Local Security Solution For Windows

Secure and lock down endpoints by controlling membership of local

groups with admin privileges, and any local group that can provide admin privileges.

 

Thycotic Local Security Solution For Windows Gives You The Ability To:

 

DISCOVER LOCAL USER/ACCOUNTS

Quickly identify local user accounts and which of those accounts have admin rights on each endpoint. Eliminate unknown groups with admin privileges to help protect and lock down your endpoints and maximise your privileged account security.

 

ENFORCE GROUP MEMBERSHIP POLICIES

Set policies to define what users belong in specific security groups and enforce least privilege best practice that says all users should be STANDARD USERS – a specific security context in Windows.

 

  • Assure only specific users are members of certain security groups (such as the Administrators group).
  • Help ensure any user account, not in a group that grants administrative rights is defined as a STANDARD USER – and these users do not get administrative rights on the endpoint.

 

ENSURE LIMITED PRIVILEGES ON USERS/ACCOUNTS

Create, maintain and manage user accounts on any endpoint, and determine which privileges are typically needed for each specific group.

 

 

 

 

Security Analysis Solution

Standards-based security configuration assessment with predefined and

customisable remediation actions to automate compliance.

 

Key Benefits With Thycotic’s Security Analysis Solution

 

Ensure your environments are secure and stable

Organisations need to address these security issues to reduce the risk of breach and maintain a secure network.

 

Demonstrate compliance

Organisations need to demonstrate that proper OS configurations are in place for compliance. Auditing is often done to expose Windows OS vulnerabilities and organisations need to show granular reporting and immediate and automated remediation.

 

Reduce organisational risk

Security misconfigurations and Windows Zero Day attacks are commonly executed attacks. Discovering these vulnerabilities and rapidly deploying fixes is a key component to a secure environment.

 

 

Group Management Server

Thycotic Group Management Server empowers non-IT business managers to securely manage their department’s Active Directory Groups without assigning them a privileged account. Using Group Management Server business department heads can easily manage their AD groups, ensuring the right people are included in their email groups, giving their staff the correct access to file systems. Group Management Server provides attestation of who has access to what, a major benefit in demonstrating proper governance and risk management.

 

  • Simply Secure
  • Easy to use tool
  • Efficient and affordable

SAS SOLUTION  DOC

LOCAL SECURITY SOLUTION

Virtual Machine Backup for Hyper-V and VMware

Choose a high performance Virtual Backup solution built for small and mid-market businesses

 

Built specifically for small and mid-market businesses

Altaro VM Backup is a fast, affordable, high performance backup solution, specially developed for small and mid-market businesses. We’ve cut the waste and hassle to give you an agile, streamlined solution that is easy to implement, feature-rich, with outstanding support as part of the package.

 

Efficient backup setup

Up and running quickly, without the need for complex configurations!

 

With Altaro VM Backup, you can install and run your first virtual machine (VM) backup in less than 15 minutes. Get up and running quickly, without the need for complex configurations or software dependencies.

 

Altaro VM Backup is designed to give you the power you need, without the hassle and steep learning curve.

 

  • Easy to use, intuitive UI - making it easy to implement a rock solid backup strategy
  • Managing and configuring backup/restore jobs across multiple hosts has never been simpler
  • Full control & scalability – Monitor and manage all your Hyper-V and VMware hosts from a single console

 

 

Full control of your backups

Powerful and fast centralised full control & scalability

 

Managing and configuring backup/restore jobs across multiple hosts has never been simpler.

 

  • Powerful functionality, easy to use - Offsite backup replication (with WAN acceleration), granular restore options for individual files and Exchange items, automated backup verification, and more!
  • Flexibility without the complexities – Simply drag and drop selected VMs to your chosen backup schedules and retention policies
  • Central management – a single pane of glass to manage all your Hyper-V and VMware backups from anywhere.

 

 

Best storage savings in the industry

 

Best deduplication in the industry - Augmented Inline Deduplication

 

Altaro VM Backup with Augmented Inline Deduplication drastically reduces your storage requirements for your backup repository. When compared to other vendors, it is the best deduplication in the industry creating the smallest backup size. Our deduplication runs across all backup jobs, you don’t need to group virtual machines together (no use of post processing). Requiring the least amount of backup space is only one of the benefits;Augmented Inline Deduplication also improves backup and restore speed.

 

  • Much lower storage requirements. When compared to other vendors Altaro creates the smallest backup size!
  • Faster backup and restore speed (less data to transfer)
  • Savings on storage requirements continue to improve as more VM backups are added
  • Augmented Inline Deduplication doesn’t tax server performance
  • Best deduplication in the industry not only for creating the smallest backup size but uses Variable Block Size for best efficiency.

 

 

FEATURES:

Augmented Inline Deduplication

 

Reduce backup storage requirements, and significantly speed up backups and restores.

Offsite backup

 

Replicate backups to an offsite location boosted with WAN acceleration or alternatively to a local network (LAN) path or set of rotated disks.

Boot VM

 

Instantly boot any VM version from the backup location and continue to restore data in the background.

Back up live VMs

 

Back up Hyper-V & VMware VMs with zero downtime by leveraging Microsoft VSS.

vCenter & CSV Support

 

Fully supports Cluster Shared Volumes (CSV) and VMware vCenter.

Fast Compression Algorithms

 

Leverage processors’ multithreading to boost up backup speed and reduce CPU requirements.

File & Exchange Item-Level Restore

 

Restore Individual Files or Exchange Items instantly from VM backups.

Automated test drills

 

Set an automated schedule to test the integrity of your backups for peace of mind

Flexible backup destinations

 

Multiple backup destinations for local backups and offsite copies.

Remote & Central console

 

Easily control, configure and monitor jobs for all your Hyper-V and VMware hosts, through a single console.

Flexible scheduling & queue

 

Schedule backups using grouped backup schedules or individual VMs.

RESOURCES

 

10 Essential Best practices for Virtual Server Backups by Brien M. Posey

 

Brien Posey outlines some of the fundamental best practices to consider when building your strategy for virtual server backups.

 

 

 

 

 

 

Altaro VM Backup Datasheet

 

 

 

 

DOWNLOAD

DOWNLOAD

Software Vulnerability Management

The Foundation to Reduce the Risk of Security Incidents Effectively

 

 

Vulnerability Management is a Prerequisite for Security

Software Vulnerability Management is a challenge for organizations of all sizes. It is an expansive discipline that cannot be addressed by technology alone, but must include policies, processes and technology.

 

It is quite common that policies are not aligned with business needs, that processes are not integrated and that technologies are not implemented to their full capabilities. The result of the misalignment is that, despite security investments, we continue to see organizations being breached and suffering significant losses as a consequence of the exploitation of known software vulnerabilities.

 

Flexera Software’s acclaimed Software Vulnerability Management solutions address these challenges, protecting companies and computers around the world.

 

 

Vulnerability Intelligence is the Foundation For Good Vulnerability Management

To successfully manage the software vulnerabilities in your environment you need to know all about them. We identified the urgency of this issue early on. Back in 2002, Secunia Research started investigating, coordinating disclosure and verifying software vulnerabilities. Today our in-house software vulnerability research remains the core of the Software Vulnerability Management products at Flexera Software.

 

Secunia Research is renowned for its accuracy, and is the guarantor that the information our customers receive through our solutions is much more than just information. It is verified intelligence, which has been scrutinized and rated before being submitted to our users in alerts customized to their environment and requirements. Our skilled and dedicated researchers work diligently to uncover and coordinate the disclosure of software vulnerabilities, and also to verify any software vulnerability reported by other sources. Secunia Research collects information from public disclosure lists and has custom-built robots crawl the internet for breaking news and rumors about new disclosures.

 

The result of this work is our Vulnerability Database, an unmatched catalog of over 50,000 applications which dates back to 2003. Our vulnerability research and our proprietary database are the foundation of our Software Vulnerability Management product portfolio which is developed to support the entire Software Vulnerability Management lifecycle.

 

 

Software Vulnerability Management Lifecycle

The Software Vulnerability Management lifecycle consists of three basic steps: Assess, Mitigate and Verify. In order to complete those steps a number of activities must be performed, supported by processes and technologies.

CSI DATASHEET

Corporate Software Inspector gives you the when, where, what and how of security patching. It tells you when a software vulnerability with an available patch is threatening your infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it.

 

Corporate Software Inspector includes an authenticated internal software inventory scanner. It can assess the security patch status of more than 20,000 programs running on Windows, Apple Mac OSX and Red Hat Enterprise Linux (RHEL) platforms. Corporate Software Inspector delivers software patching, configuration tools and hundreds of pre-configured patches for non-Microsoft applications running on Windows platforms.

 

The seamless integration with Microsoft System Center and Windows Server Update Services for security patch management means you maximise your investment and manage the patching of non-Microsoft products easily from within Microsoft System Center, using your existing infrastructure.

 

Features:

 

  •     Microsoft System Center Configuration Manager Integration
  •     Extensive Program Coverage
  •     Smart Groups
  •     Authenticated Scanning
  •     Corporate Software Inspector Package System (SPS)
  •     Scans Apple Mac OSX and RHEL
  •     Live Update
  •     User Management

 

 

 

 

 

Vulnerability Intelligence Manager leverages the intelligence from Flexera Research as the foundational layer to enable security and operations’ professionals to prioritise their work.

 

The combination of broad coverage, vulnerability intelligence provided by Flexera Research and management features makes it possible for organisations to assess risk based on the relative criticality of vulnerabilities in their own environment, driving the effective use of resources to prioritise mitigation actions with highest impact to reduce the attack surface for cyber criminals and hackers.

 

Features:

 

  •     Verified Intelligence
  •     Flexera Advisories
  •     Extensive Coverage
  •     Automate List of Applications to Monitor for Advisories
  •     Service Now and BMC Remedy Ticketing
  •     Comprehensive Management Features
  •     Effective Prioritisation of Mitigation Efforts

 

 

 

 

 

 

 

 

 

 

Personal Software Inspector is a security scanner which identifies programs that are insecure and need updates. It automates the updating of the majority of these programs, making it a lot easier to maintain a secure PC. It automatically detects insecure programs, downloads the required patches, and installs them accordingly without further user interaction.

 

Personal Software Inspector also detects and notifies you of programs that cannot be automatically updated with software patches and provides you with detailed instructions for updating the program when available. In most cases, you simply need to click the appropriate icon in the Results window and follow the on-screen instructions to install the latest patches.

 

Features:

 

  •     Automatic Update of Programs
  •     Available in 8 Languages
  •     Covers Programs from Thousands of Vendors
  •     Comprehensive Management Features
  •     Reports Security Status for Each Program
  •     Detects End-of-life Programs

 

VIM DATASHEET

Quote Request

Submitting Form...

Form submission unsuccessful.

Form received.

A  1 0 0 0   B U S I N E S S   C H A L L E N G E S ?

Your clients IT security doesn't have to be one of them.

Sales

Our readily available account managers will assist with any sales queries, product or services quotes. We believe in long term sustainable relationships that enables business continuity and growth.

What we can assist with

Quotations

We can assist with quotations on any of our products or services.

Training

We can assist with booking training for your client for the relevant product sets.

POCs

 We can schedule a proof of concept for any of our related product sets.

Sign up to become a partner

Submitting Form...

Form submission unsuccessful.

Form received.

'Two heads are always better than one.'

 

Send through your request and we will contact you with the relevant information needed to complete your registration.

Services

Deployment

 

Let us get things up and running

 

This service is a supported service, which constitutes that a Netxactics engineer will support your technical team in deploying the product across your organisation.

Maintenance

 

We'll keep an eye on things

 

Through scheduled health checks and reporting, the Maintenance Service removes the burden of routine maintenance and enables you to focus on more pressing projects.

Workshops

 

Let us train you and certify you

 

These workshops are intended to provide a proper understanding of the platform to enable effective administration, deployment and maintenance of the solution.

Reporting

 

Need visibility? No problem

 

Detailed reporting provides an accurate health status on the solution deployed in your network..

On-site Call Out

 

Call us, we’ll be there to assist on-site

 

Netxactics On-site Support is a prepaid service, where hourly bundles of 10, 20 or 30 hours can be purchased upfront. Alternatively, we can arrange a billed-per-hour on-site support.

Telephonic & Email Support

 

Need assistance?

Give us a shout, we’d love to help

 

Netxactics Premium Telephonic & Email Support offers experienced technical support for the operation of the Netxactics product offerings.

Remote Support

 

Need help, no matter where you are we can log in and assist

 

Netxactics Remote Support offers a flexible and effective way to gain access to experienced Netxactics Services engineers to assist you remotely with a solution, independent of geographical location.

Request a services quote

Submitting Form...

Form submission unsuccessful.

Form received.

Training

We offer training on the below products.

 

Please request training by completing the form. Dates and times will be communicated upon making a request.

 

 

All training sessions are hosted at the Netxactics offices.

Sophos UTM Training

Sophos EndUser Protection Training

Sophos SafeGuard Enterprise Training

Engineer Training

(Non-Certified)

 

UTM/XG Product

 

3 Days Training

 

Costing is available per

booking or request

 

Max 6 attendees allowed

EndUser Protection

Training

(Non-Certified)

 

Endpoint SMC

 

3 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

Sophos SafeGuard

Enterprise

(Non-Certified)

 

SafeGuard Enterprise / Full Disk /  Native / Cloud / File & Folder / Data Exchange

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

Rapid7 Training

InsightVM  Training

(Certified)

 

InsightVM (Nexpose)

 

2 Days Training

 

Costing is available per booking or request

 

Max 10 attendees allowed

 

Held at the NX Offices & Online

Metasploit Training

(Certified)

 

Metasploit

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

 

Held at the NX Offices & Online

Appspider Training

(Certified)

 

Appspider

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

InsightIDR Training

(Certified)

 

InsightIDR

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

Submitting Form...

Form submission unsuccessful.

Form received.

Book a Training Session

Marketing

We offer marketing support to our partners through the creation of email campaigns, and marketing essentials for various applications.

What we can assist with

Email Campaigns

 

We can assist with the creation of an email campaign about any of our products in HTML format to use in a focused campaign to your clients.

Printed Media

 

Should you need an advert, data-sheet, diagram or any design related to one of our products, we can assist with a design for your specific application.

Online Application

 

You can download our marketing essentials that contain the needed logo's, product summaries and related collateral for use on your website or other Online applications.

Partner End User Events

 

We have the needed resources to assist in planning and executing an end user product-focused event. We can help plan it, create invites and execute on the day of the event.

Download Your Marketing Essentials

Need help with anything? Give us a shout

Submitting Form...

Form submission unsuccessful.

Form received.

Johannesburg Head Office

T +27 11 444 4000

F +27 11 444 7000

info@nx.co.za

 

Physical Address

164 Katherine Street

Pinmill Farm

Block F, Lower level

Sandton

2416

 

Cape Town Branch Office

T +27 21 526 0455

F +27 21 526 0311

info@nx.co.za

 

Physical Address

Foyer 3, Century Way,

Century City

Cape Town

7441

Port Elizabeth Branch Office

T +27 21 526 0455

F +27 21 526 0311

info@nx.co.za

 

 

 

 

 

NETWORK

XG Firewall

The Next Thing in next-gen:

 

Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed to the way they report information and how they work with other security systems around them, giving you an unprecedented level of simplicity, insight, and advanced threat protection.

 

With an interface designed to eliminate unnecessary complexity, it enables you to use the powerful features without needing to become an IT security expert.

 

 

SG UTM

The Ultimate Network Security Package

 

With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to provide optimal performance, versatility, and efficiency to meet all your security needs.

 

The Sophos SG Series appliances are designed to provide the optimal balance between performance and protection – for diverse IT environments. Whether you need a solution for a small remote office, want to protect your school campus, or are a global organisation requiring high-availability and enterprise-grade features, our SG Series appliances are an ideal fit.

 

 

Secure Wi-Fi

Super secure super Wi-Fi

 

Sophos Wireless provides a simple, effective way to manage and secure your wireless networks. Managed from Sophos Central, it is easy to deploy as a standalone product or as part of your portfolio of cloud-managed solutions.

 

 

Secure Web Gateway

Complete web protection.

 

The web is the number one source of threats, with 80% of them coming from legitimate, trusted sites. Sophos Web Gateway provides security, visibility, and control for all your desktop PCs, Macs, Chrome books, and mobile devices, regardless of how or where they access the web. And you get the simple, elegant management experience that is Sophos Central.

 

 

Secure Email Gateway

Simple protection for a complex problem

 

Sophos Email is a secure email gateway engineered to keep businesses safe from all email threats. It simply stops spam, phishing, malware and data loss and keeps your people productive. And if you want to consolidate protection it lets you control email security alongside endpoint, mobile, the web, and wireless protection from Sophos Central’s single interface.

 

 

 

XG FIREWALL DATASHEET

SG UTM DATASHEET

SECURE WI-FI DATASHEET

SECURE  WEB DATASHEET

SECURE  EMAIL DATASHEET

ENDUSER & SERVER

Endpoint Protection

Comprehensive security for users and data

 

Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and advanced threats, such as targeted attacks. Our next-generation endpoint protection integrates innovative technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. We also add web filtering, application control, device control and more right into the lightweight endpoint agent, so your organisation’s policies are enforced anywhere your users go.

 

 

Intercept X

A completely new approach to endpoint security

 

Sophos Intercept X adds next-generation signature-less technologies on top of your current endpoint security to give you complete, layered protection. Sophos Intercept X uses multiple layers of technology, allowing you to create your own tailored next-generation endpoint security solution.

 

 

Mobile Control

Countless devices, one solution

 

Your users are accessing corporate data on their personal mobile devices more and more. However, this creates management and security challenges. Sophos Mobile Control allows you to keep your users productive while securing all of those different mobile devices with minimal IT effort.

 

 

SafeGuard Encryption

Protecting your data, wherever it goes

 

Sophos SafeGuard encrypts content as soon as it is created. The encryption is always on, allowing for seamless and secure collaboration. Synchronised Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data. This method of always-on protection goes everywhere your data goes, making it the most comprehensive data security solution on the market.

 

 

Server Protection

Security optimised for servers

 

Sophos Server Protection protects your server environment from malicious attacks while keeping your servers running at optimum performance. Designed to secure business critical servers, Sophos Server Protection includes server application white-listing, advanced anti-malware, and behaviour analysis. It’s server security made simple, providing protection for your Windows, Linux, and UNIX systems, and optimised for virtual environments.

 

 

Phish Threat

Reduce your largest attack surface — your end users

 

A solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.

 

Phish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.

 

 

Sophos Home

Free protection for home computers

 

Sophos Home protects every Mac and PC in your home from malware, viruses, ransomware, and inappropriate websites. It uses the same award-winning technology that IT professionals trust to protect their businesses. Best of all, you can manage security settings for the whole family from any browser.

 

PHISH THREAT DATASHEET

SERVER PROTECTION DATASHEET

SAFEGUARD DATASHEET

MOBILE CONTROL DATASHEET

MOBILE SECURITY DATASHEET

INTERCEPT X DATASHEET

ENDPOINT PROTECTION DATASHEET

Rapid7 products make your data more productive, unlocking answers you can use to remediate vulnerabilities, detect breaches, enhance IT operations, and more. How? They collect operational data from across your entire ecosystem - logs, endpoints, everything - then apply real-time analytics powered by an unmatched understanding of attackers and IT operations. It’s a process that transforms your data into insight, prioritises it based on your business objectives, and helps coordinate workflow to resolve the problem.

 

 

insightVM

Live vulnerability management and endpoint analytics

 

The modern network is no longer comprised simply of servers and desktops; remote workers, cloud and virtualization, and mobile devices mean your risk exposure is changing every minute. Utilizing the power of Rapid7’s Insight Platform and the heritage of our award-winning Nexpose solution, InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize your risk.

 

INISIGHTVM DATASHEET

Collect

Automatically collect, monitor, and analyze vulnerabilities on your network.

Prioritise

View real-time risks and leverage custom views tailored to your users.

Remediate

Provide IT with the data they need to fix quickly, then track progress in real-time.

metasploit

Penetration testing software to help you act like the attacker

 

Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilising an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

METASPLOIT DATASHEET

Uncover Weaknesses

Find your vulnerabilities with

automated penetration tests powered by the world’s largest

exploit database.

Maximise Impact

Test and harden your people,

processes, and technology in

order of potential impact on

risk reduction.

Remediate Faster

Test your security program to

identify and more quickly fix

exposures.

appspider

Web application security testing to close the gaps in your apps

 

SPAs, APIs, mobile—the evolution of application technology is measured in months, not years. Is your web application security testing tool designed to keep up? AppSpider lets you collect all the information needed to test all the apps so that you aren’t left with gaping application risks.

 

The dynamic application security testing (DAST) solution crawls to the deepest, darkest corners of even the most modern and complex apps to effectively test for risk and get you the insight you need to remediate faster. With AppSpider on your side (or, rather, all of your sides), you’ll be able to scan all the apps today and always be ready for whatever comes next.

 

APPSPIDER DATASHEET

Keep Pace

Collect the info needed to test today’s ever-evolving apps.

Reduce Risk

Reduce risk with every build and remediate earlier in the SDLC.

Play Nice

Hand deliver the right insight the right way to DevOps.

insightIDR

Transform your data into actionable insight

 

Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.

Prioritise Your Search

Uncover insight that is hidden in user activity, logs, and endpoints,

to make investigations

20x faster.

Unify SIEM, UBA, and EDR

Augment reach across your entire ecosystem to find intruders early and get more from existing investments.

Detect Attacks Earlier

Detect intruders earlier in the attack chain so you can respond before critical data is compromised.

INSIGHTIDR DATASHEET

insightOPS

Your operations centre for endpoint visibility and infrastructure analytics.

 

InsightOps combines live endpoint visibility with log analytics, creating one console for total infrastructure awareness.

INSIGHTOPS DATASHEET

Centralize Your Data

Easily centralize data from across your infrastructure in one secure location.

Search and Ask

Search logs and ask questions of your endpoints for immediate results.

Find Answers

Find answers with relevant context that enables you to solve problems fast.

Logentries

Centralized Logging. Simple and Free.

Logentries’ centralized logging service takes only minutes to setup and is free to use. Centralize logs from multiple sources and search using a simple query builder.

Collect & Centralize

Stream logs from all environments into Logentries’ centralized log server in real-time.

 

 

Search & Analyze

Search using basic keywords or our advanced query language for deeper analysis.

 

 

Visualize & Report

Build charts, graphs and alerts to monitor performance, user behavior and more.

 

DOWNLOAD FREE TRIAL

SECURE PASSWORDS

Secret Server Privileged Account Management from Thycotic

Secret Server enables you to store, distribute, change, and audit enterprise passwords in a secure environment

 

  • Manage and Organise
  • Seamless Integration
  • Essential Compliance
  • Real-Time Management
  • Top-Level Security
  • Disaster Recovery

 

Secret Server On-premise

Secret Server on-premise enables you to Detect, control, distribute, Change, and audit passwords in a secure environment.

 

Secret Server Cloud

Privileged account password management software for IT Admins and IT Security Pros Automatically manage and secure your sensitive privileged passwords in minutes – with the power and affordability of the cloud.

 

 

Password Reset Server for Active Directory and Office 365 accounts

Your enterprise-level password reset solution

 

  • Secure Identity Verification
  • Windows Logon Integration and Web Portal
  • AD Attribute Maintenance
  • Custom Security Policies
  • Automated or Custom Enrollment
  • Section 508 Compliant

 

THYCOTIC OVERVIEW

THYCOTIC PAM DATASHEET

ENDPOINT PRIVILEGED ACCESS SECURITY SUITE

 

Proactive IT security from Thycotic to secure passwords, protect endpoints and control access

 

Why Security Professionals and IT Admins Love it

  • Only comprehensive yet simple multi-layered protection against ransomware and advanced threats
  • Easiest to manage, integrated security for endpoints and privileged account passwords
  • Enforces least privilege policies, and password best security practices without impacting productivity
  • Saves time and reduces help desk calls

 

Thycotic blocks cyber security attacks with multiple layers of security:

Keep attackers off endpoints

Stop malicious applications and Unix commands from running with Windows application white-listing, black-listing, and flexible greylisting. Now, you only give elevated privilege for approved applications and commands.

Enforce least privilege for everyone

Eliminate the ability for malware to run by automatically enforcing least privilege for everyone on your network through group policy. Reduce attack vectors by automatically finding and fixing OS configuration issues.

Protect privileged credentials

Discover, secure, and manage the use of privileged account passwords, continuously rotating passwords to prevent abuse. Monitor all privileged

password activity and alert for unusual behaviours or potential

PROTECT ENDPOINTS & CONTROL ACCESS

 

Privilege Manager for Windows

Privilege Manager for Windows protects your vulnerable endpoints with effective yet flexible application access control

  • Assures Comprehensive Application Control Controls what apps can be installed, which can run with elevated access, and who gets appropriate privileges, for strong endpoint protection.
  • Simplifies Your Tasks Gives you the simplest to use, easiest to manage and most flexible application control solution.
  • Speeds Time to Value Provides rapid application discovery and policy templates that speed time to value and make privilege management a breeze.
  • Implements Least Privilege You can assure least privilege access across applications without interfering with IT admin or employee productivity.
  • Demonstrates Compliance Built in reports, such as applied policies or access approvals, help you meet compliance requirements for PCI, NIST, NERC CIP, SOX and more.
  • Integrates with Secret Server Combining Thycotic’s endpoint security software with our leading privileged account password  software, you get complete multi-layered protection of your privileged credentials and endpoints.

Privilege Manager for Unix

Enhance your Secret Server security by enforcing least privilege on Unix/Linux root admin accounts!

 

  • Ensure privileged accounts are more secure by enforcing least privilege policies for Unix superusers without impacting their productivity.
  • Minimise the risk of data breaches and insider abuse associated with unauthorised access to, or escalated privileges of, Unix superuser accounts.
  • Demonstrate compliance with security policies and regulations by showing auditors that superuser privileges are effectively managed, monitored, controlled, and secure.
  • Save time and money by significantly reducing help desk calls and minimising Unix admin account management issues.
  • Enable Unix administrators to centrally manage and provision Unix accounts that are linked to AD.
  • Understand and prove to auditors what users are authorised to do with  root credentials.

 

Local Security Solution For Windows

Secure and lock down endpoints by controlling membership of local

groups with admin privileges, and any local group that can provide admin privileges.

 

Thycotic Local Security Solution For Windows Gives You The Ability To:

 

DISCOVER LOCAL USER/ACCOUNTS

Quickly identify local user accounts and which of those accounts have admin rights on each endpoint. Eliminate unknown groups with admin privileges to help protect and lock down your endpoints and maximise your privileged account security.

 

  • ENFORCE GROUP MEMBERSHIP POLICIES
  • ENSURE LIMITED PRIVILEGES ON USERS/ACCOUNTS

 

Security Analysis Solution

Standards-based security configuration assessment with predefined and

customisable remediation actions to automate compliance.

 

Key Benefits With Thycotic’s Security Analysis Solution

 

  • Ensure your environments are secure and stable
  • Demonstrate compliance
  • Reduce organisational risk

 

 

Group Management Server

Thycotic Group Management Server empowers non-IT business managers to securely manage their department’s Active Directory Groups without assigning them a privileged account. Using Group Management Server business department heads can easily manage their AD groups, ensuring the right people are included in their email groups, giving their staff the correct access to file systems. Group Management Server provides attestation of who has access to what, a major benefit in demonstrating proper governance and risk management.

 

SAS SOLUTION  DOC

LOCAL SECURITY SOLUTION

Virtual Machine Backup for Hyper-V and VMware

Choose a high performance Virtual Backup solution built for small and mid-market businesses

 

Built specifically for small and mid-market businesses

Altaro VM Backup is a fast, affordable, high performance backup solution, specially developed for small and mid-market businesses. We’ve cut the waste and hassle to give you an agile, streamlined solution that is easy to implement, feature-rich, with outstanding support as part of the package.

 

Efficient backup setup

Up and running quickly, without the need for complex configurations!

 

With Altaro VM Backup, you can install and run your first virtual machine (VM) backup in less than 15 minutes. Get up and running quickly, without the need for complex configurations or software dependencies.

 

Altaro VM Backup is designed to give you the power you need, without the hassle and steep learning curve.

 

  • Easy to use, intuitive UI - making it easy to implement a rock solid backup strategy
  • Managing and configuring backup/restore jobs across multiple hosts has never been simpler
  • Full control & scalability – Monitor and manage all your Hyper-V and VMware hosts from a single console

 

 

Full control of your backups

Powerful and fast centralised full control & scalability

 

Managing and configuring backup/restore jobs across multiple hosts has never been simpler.

 

  • Powerful functionality, easy to use - Offsite backup replication (with WAN acceleration), granular restore options for individual files and Exchange items, automated backup verification, and more!
  • Flexibility without the complexities – Simply drag and drop selected VMs to your chosen backup schedules and retention policies
  • Central management – a single pane of glass to manage all your Hyper-V and VMware backups from anywhere.

 

 

Best storage savings in the industry

 

Best deduplication in the industry - Augmented Inline Deduplication

 

Altaro VM Backup with Augmented Inline Deduplication drastically reduces your storage requirements for your backup repository. When compared to other vendors, it is the best deduplication in the industry creating the smallest backup size. Our deduplication runs across all backup jobs, you don’t need to group virtual machines together (no use of post processing). Requiring the least amount of backup space is only one of the benefits;Augmented Inline Deduplication also improves backup and restore speed.

 

  • Much lower storage requirements. When compared to other vendors Altaro creates the smallest backup size!
  • Faster backup and restore speed (less data to transfer)
  • Savings on storage requirements continue to improve as more VM backups are added
  • Augmented Inline Deduplication doesn’t tax server performance
  • Best deduplication in the industry not only for creating the smallest backup size but uses Variable Block Size for best efficiency.

 

 

FEATURES:

Augmented Inline Deduplication

 

Reduce backup storage requirements, and significantly speed up backups and restores.

Offsite backup

 

Replicate backups to an offsite location boosted with WAN acceleration or alternatively to a local network (LAN) path or set of rotated disks.

Boot VM

 

Instantly boot any VM version from the backup location and continue to restore data in the background.

Back up live VMs

 

Back up Hyper-V & VMware VMs with zero downtime by leveraging Microsoft VSS.

vCenter & CSV Support

 

Fully supports Cluster Shared Volumes (CSV) and VMware vCenter.

Fast Compression Algorithms

 

Leverage processors’ multithreading to boost up backup speed and reduce CPU requirements.

File & Exchange Item-Level Restore

 

Restore Individual Files or Exchange Items instantly from VM backups.

Automated test drills

 

Set an automated schedule to test the integrity of your backups for peace of mind

Flexible backup destinations

 

Multiple backup destinations for local backups and offsite copies.

Flexible scheduling & queue

 

Schedule backups using grouped backup schedules or individual VMs.

Remote & Central console

 

Easily control, configure and monitor jobs for all your Hyper-V and VMware hosts, through a single console.

RESOURCES

 

10 Essential Best practices for Virtual Server Backups by Brien M. Posey

 

Brien Posey outlines some of the fundamental best practices to consider when building your strategy for virtual server backups.

 

 

 

 

 

Altaro VM Backup Datasheet

 

 

 

 

DOWNLOAD

DOWNLOAD

Software Vulnerability Management

The Foundation to Reduce the Risk of Security Incidents Effectively

 

 

Vulnerability Management is a Prerequisite for Security

Software Vulnerability Management is a challenge for organizations of all sizes. It is an expansive discipline that cannot be addressed by technology alone, but must include policies, processes and technology.

 

It is quite common that policies are not aligned with business needs, that processes are not integrated and that technologies are not implemented to their full capabilities. The result of the misalignment is that, despite security investments, we continue to see organizations being breached and suffering significant losses as a consequence of the exploitation of known software vulnerabilities.

 

Flexera Software’s acclaimed Software Vulnerability Management solutions address these challenges, protecting companies and computers around the world.

 

 

Vulnerability Intelligence is the Foundation For Good Vulnerability Management

To successfully manage the software vulnerabilities in your environment you need to know all about them. We identified the urgency of this issue early on. Back in 2002, Secunia Research started investigating, coordinating disclosure and verifying software vulnerabilities. Today our in-house software vulnerability research remains the core of the Software Vulnerability Management products at Flexera Software.

 

Secunia Research is renowned for its accuracy, and is the guarantor that the information our customers receive through our solutions is much more than just information. It is verified intelligence, which has been scrutinized and rated before being submitted to our users in alerts customized to their environment and requirements. Our skilled and dedicated researchers work diligently to uncover and coordinate the disclosure of software vulnerabilities, and also to verify any software vulnerability reported by other sources. Secunia Research collects information from public disclosure lists and has custom-built robots crawl the internet for breaking news and rumors about new disclosures.

 

The result of this work is our Vulnerability Database, an unmatched catalog of over 50,000 applications which dates back to 2003. Our vulnerability research and our proprietary database are the foundation of our Software Vulnerability Management product portfolio which is developed to support the entire Software Vulnerability Management lifecycle.

 

 

Software Vulnerability Management Lifecycle

The Software Vulnerability Management lifecycle consists of three basic steps: Assess, Mitigate and Verify. In order to complete those steps a number of activities must be performed, supported by processes and technologies

Corporate Software Inspector gives you the when, where, what and how of security patching. It tells you when a software vulnerability with an available patch is threatening your infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it.

 

Corporate Software Inspector includes an authenticated internal software inventory scanner. It can assess the security patch status of more than 20,000 programs running on Windows, Apple Mac OSX and Red Hat Enterprise Linux (RHEL) platforms. Corporate Software Inspector delivers software patching, configuration tools and hundreds of pre-configured patches for non-Microsoft applications running on Windows platforms.

 

The seamless integration with Microsoft System Center and Windows Server Update Services for security patch management means you maximise your investment and manage the patching of non-Microsoft products easily from within Microsoft System Center, using your existing infrastructure.

 

Features:

 

  •     Microsoft System Center Configuration Manager Integration
  •     Extensive Program Coverage
  •     Smart Groups
  •     Authenticated Scanning
  •     Corporate Software Inspector Package System (SPS)
  •     Scans Apple Mac OSX and RHEL
  •     Live Update
  •     User Management

CSI DATASHEET

Vulnerability Intelligence Manager leverages the intelligence from Flexera Research as the foundational layer to enable security and operations’ professionals to prioritise their work.

 

The combination of broad coverage, vulnerability intelligence provided by Flexera Research and management features makes it possible for organisations to assess risk based on the relative criticality of vulnerabilities in their own environment, driving the effective use of resources to prioritise mitigation actions with highest impact to reduce the attack surface for cyber criminals and hackers.

 

Features:

 

  •     Verified Intelligence
  •     Flexera Advisories
  •     Extensive Coverage
  •     Automate List of Applications to Monitor for Advisories
  •     Service Now and BMC Remedy Ticketing
  •     Comprehensive Management Features
  •     Effective Prioritisation of Mitigation Efforts

 

 

 

 

 

 

Personal Software Inspector is a security scanner which identifies programs that are insecure and need updates. It automates the updating of the majority of these programs, making it a lot easier to maintain a secure PC. It automatically detects insecure programs, downloads the required patches, and installs them accordingly without further user interaction.

 

Personal Software Inspector also detects and notifies you of programs that cannot be automatically updated with software patches and provides you with detailed instructions for updating the program when available. In most cases, you simply need to click the appropriate icon in the Results window and follow the on-screen instructions to install the latest patches.

 

Features:

 

  •     Automatic Update of Programs
  •     Available in 8 Languages
  •     Covers Programs from Thousands of Vendors
  •     Comprehensive Management Features
  •     Reports Security Status for Each Program
  •     Detects End-of-life Programs

 

VIM DATASHEET

  • Sophos

    NETWORK

     

    XG Firewall

    The Next Thing in next-gen:

     

    Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed to the way they report information and how they work with other security systems around them, giving you an unprecedented level of simplicity, insight, and advanced threat protection.

     

    With an interface designed to eliminate unnecessary complexity, it enables you to use the powerful features without needing to become an IT security expert.

     

    SG UTM

    The Ultimate Network Security Package

     

    With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to provide optimal performance, versatility, and efficiency to meet all your security needs.

     

     The Sophos SG Series appliances are designed to provide the optimal balance between performance and protection – for diverse IT environments. Whether you need a solution for a small remote office, want to protect your school campus, or are a global organisation requiring high-availability and enterprise-grade features, our SG Series appliances are an ideal fit.

     

     

    Secure Wi-Fi

    Super secure super Wi-Fi

     

    Sophos Wireless provides a simple, effective way to manage and secure your wireless networks. Managed from Sophos Central, it is easy to deploy as a standalone product or as part of your portfolio of cloud-managed solutions.

     

    Secure Web Gateway

    Complete web protection.

     

    Sophos Web Gateway

    • Reliable, globally-deployed cloud infrastructure
    • Enterprise-grade Secure Web Gateway that’s advanced yet easy to use
    • Manage all your Sophos Central security from one unified console
    • Fast Lane technology that can speed up web browsing

     

    Secure Email Gateway

    Simple protection for a complex problem

     

    Sophos Email

    • Fast setup and easy integration
    • Proven anti-virus, anti-Spam, and anti-phishing
    • Email continuity with an end-user, self-service portal; spooling; and emergency inbox
    • Reliable, global Sophos-hosted infrastructure
    • Manage alongside endpoint, the web, and wireless in Sophos Central’s unified console

     

     

     

    ENDUSER & SERVER

     

    Endpoint Protection

    Comprehensive security for users and data

     

    Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and advanced threats, such as targeted attacks. Our next-generation endpoint protection integrates innovative technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. We also add web filtering, application control, device control and more right into the lightweight endpoint agent, so your organisation’s policies are enforced anywhere your users go.

     

     

    Intercept X

    A completely new approach to endpoint security

     

     Sophos Intercept X adds next-generation signature-less technologies on top of your current endpoint security to give you complete, layered protection.

     

    Sophos Intercept X uses multiple layers of technology, allowing you to create your own tailored next-generation endpoint security solution.

     

     

    Mobile Control

    Countless devices, one solution

     

     Your users are accessing corporate data on their personal mobile devices more and more. However, this creates management and security challenges. Sophos Mobile Control allows you to keep your users productive while securing all of those different mobile devices with minimal IT effort.

     

     

    SafeGuard Encryption

    Protecting your data, wherever it goes

     

    Sophos SafeGuard encrypts content as soon as it is created. The encryption is always on, allowing for seamless and secure collaboration. Synchronised Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data. This method of always-on protection goes everywhere your data goes, making it the most comprehensive data security solution on the market.

     

     

    Server Protection

    Security optimised for servers

     

    Sophos Server Protection protects your server environment from malicious attacks while keeping your servers running at optimum performance. Designed to secure business critical servers, Sophos Server Protection includes server application white-listing, advanced anti-malware, and behaviour analysis. It’s server security made simple, providing protection for your Windows, Linux, and UNIX systems, and optimised for virtual environments.

     

     

    Phish Threat

    Reduce your largest attack surface — your end users

     

    A solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.

     

    Phish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.

     

     

    Sophos Home

    Free protection for home computers

     

    Sophos Home protects every Mac and PC in your home from malware, viruses, ransomware, and inappropriate websites. It uses the same award-winning technology that IT professionals trust to protect their businesses. Best of all, you can manage security settings for the whole family from any browser.

     

     

  • Rapid7

    insightVM

    Live vulnerability management and endpoint analytics

     

     The modern network is no longer comprised simply of servers and desktops; remote workers, cloud and virtualization, and mobile devices mean your risk exposure is changing every minute. Utilizing the power of Rapid7’s Insight Platform and the heritage of our award-winning Nexpose solution, InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize your risk.

     

    metasploit

    Penetration testing software to help you act like the attacker

     

    Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilising an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

     

    appspider

    Web application security testing to close the gaps in your apps

    SPAs, APIs, mobile—the evolution of application technology is measured in months, not years. Is your web application security testing tool designed to keep up? AppSpider lets you collect all the information needed to test all the apps so that you aren’t left with gaping application risks.

     

    The dynamic application security testing (DAST) solution crawls to the deepest, darkest corners of even the most modern and complex apps to effectively test for risk and get you the insight you need to remediate faster. With AppSpider on your side (or, rather, all of your sides), you’ll be able to scan all the apps today and always be ready for whatever comes next.

     

    insightOps

    Your operations centre for endpoint visibility and infrastructure analytics.

     

    InsightOps combines live endpoint visibility with log analytics, creating one console for total infrastructure awareness.

     

    Logentries

    Centralized Logging. Simple and Free.

    Logentries’ centralized logging service takes only minutes to setup and is free to use. Centralize logs from multiple sources and search using a simple query builder.

     

  • Thycotic

    SECURE PASSWORDS

    Secret Server Privileged Account Management from Thycotic

     

    Secret Server enables you to store, distribute, change, and audit enterprise passwords in a secure environment

     

    • Manage and Organise
    • Seamless Integration
    • Essential Compliance
    • Real-Time Management
    • Top-Level Security
    • Disaster Recovery

     

    Password Reset Server for Active Directory and Office 365 accounts

    Your enterprise-level password reset solution

     

    • Secure Identity Verification
    • Windows Logon Integration and Web Portal
    • AD Attribute Maintenance
    • Custom Security Policies
    • Automated or Custom Enrollment
    • Section 508 Compliant

     

    ENDPOINT PRIVILEGED ACCESS SECURITY SUITE

    Proactive IT security from Thycotic to secure passwords, protect endpoints and control access

     

    Why Security Professionals and IT Admins Love it

    • Only comprehensive yet simple multi-layered protection against ransomware and advanced threats
    • Easiest to manage, integrated security for endpoints and privileged account passwords
    • Enforces least privilege policies, and password best security practices without impacting productivity
    • Saves time and reduces help desk calls

     

     

    PROTECT ENDPOINTS & CONTROL ACCESS

     

    Privilege Manager for Windows

    Privilege Manager for Windows protects your vulnerable endpoints with effective yet flexible application access control

     

    Privilege Manager for Unix

    Enhance your Secret Server security by enforcing least privilege on Unix/Linux root admin accounts!

     

     

    Local Security Solution For Windows

    Secure and lock down endpoints by controlling membership of local

    groups with admin privileges, and any local group that can provide admin privileges.

     

    Thycotic Local Security Solution For Windows Gives You The Ability To:

    • Discover Local User/accounts
    • Enforce Group Membership Policies
    • Ensure Limited Privileges On Users/accounts

     

    Security Analysis Solution

    Standards-based security configuration assessment with predefined and customisable remediation actions to automate compliance.

     

    Key Benefits With Thycotic’s Security Analysis Solution:

    • Ensure your environments are secure and stable
    • Demonstrate compliance
    • Reduce organisational risk

     

     

    Group Management Server

     

    Thycotic Group Management Server empowers non-IT business managers to securely manage their department’s Active Directory Groups without assigning them a privileged account. Using Group Management Server business department heads can easily manage their AD groups, ensuring the right people are included in their email groups, giving their staff the correct access to file systems. Group Management Server provides attestation of who has access to what, a major benefit in demonstrating proper governance and risk management.

     

  • Altaro

    Virtual Machine Backup for Hyper-V and VMware

    Choose a high performance Virtual Backup solution built for small and mid-market businesses

     

     

    Built specifically for small and mid-market businesses

    Altaro VM Backup is a fast, affordable, high performance backup solution, specially developed for small and mid-market businesses. We’ve cut the waste and hassle to give you an agile, streamlined solution that is easy to implement, feature-rich, with outstanding support as part of the package.

     

     

    Efficient backup setup

    Up and running quickly, without the need for complex configurations!

     

    With Altaro VM Backup, you can install and run your first virtual machine (VM) backup in less than 15 minutes. Get up and running quickly, without the need for complex configurations or software dependencies.

     

    Altaro VM Backup is designed to give you the power you need, without the hassle and steep learning curve.

     

    • Easy to use, intuitive UI - making it easy to implement a rock solid backup strategy
    • Managing and configuring backup/restore jobs across multiple hosts has never been simpler
    • Full control & scalability – Monitor and manage all your Hyper-V and VMware hosts from a single console

     

     

  • Flexera

    Software Vulnerability Management

    The Foundation to Reduce the Risk of Security Incidents Effectively

     

    Vulnerability Management is a Prerequisite for Security

    Software Vulnerability Management is a challenge for organizations of all sizes. It is an expansive discipline that cannot be addressed by technology alone, but must include policies, processes and technology.

     

    It is quite common that policies are not aligned with business needs, that processes are not integrated and that technologies are not implemented to their full capabilities. The result of the misalignment is that, despite security investments, we continue to see organizations being breached and suffering significant losses as a consequence of the exploitation of known software vulnerabilities.

     

    Flexera Software’s acclaimed Software Vulnerability Management solutions address these challenges, protecting companies and computers around the world.

     

     

    Corporate Software Inspector

    Corporate Software Inspector gives you the when, where, what and how of security patching. It tells you when a software vulnerability with an available patch is threatening your infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it.

     

     

    Vulnerability Intelligence Manager

    Vulnerability Intelligence Manager leverages the intelligence from Flexera Research as the foundational layer to enable security and operations’ professionals to prioritise their work.

     

    The combination of broad coverage, vulnerability intelligence provided by Flexera Research and management features makes it possible for organisations to assess risk based on the relative criticality of vulnerabilities in their own environment, driving the effective use of resources to prioritise mitigation actions with highest impact to reduce the attack surface for cyber criminals and hackers.

     

     

    Personal Software Inspector

    Personal Software Inspector is a security scanner which identifies programs that are insecure and need updates. It automates the updating of the majority of these programs, making it a lot easier to maintain a secure PC. It automatically detects insecure programs, downloads the required patches, and installs them accordingly without further user interaction.

     

    Personal Software Inspector also detects and notifies you of programs that cannot be automatically updated with software patches and provides you with detailed instructions for updating the program when available. In most cases, you simply need to click the appropriate icon in the Results window and follow the on-screen instructions to install the latest patches.