Problem: employees using unapproved software at workplaces, losing mobile devices with service information.
Solution: allows centralized management of corporate devices to ensure security, support and management of business devices.
Implementation: this solution was implemented in LifeCell UA.
Result (s) achieved: loss of confidential information was minimized, the policy of installed software was regulated.
Thunder NSI solution and implemented cases
using a cloud platform, it takes care of all the DNS queries, analyzes them and sends only trusted queries to the client’s network.
300K + threats blocked, reduction in the number of calls to the support service, the database “Big Data” 2B + data points was created, the caching speed was increased to 90%.
Collection and analysis of logs. Prioritization of information security events. Investigation of incidents. User Behavioral Analysis.
IBM Qradar, UBA, Watson.
Collection and analysis of 1.3 TB of logs per day. Prioritize all information security events. The threat response time has been reduced from 5 hours to 10 minutes. The time to investigate incidents decreased from 6 days to 4 hours. Behavioral analysis of all employees for risks to the company and infrastructure. All events from different sources of information are now in one interface.
a wide variety of network devices.
a wide variety of network devices.
Vulnerability Management. Inventory of IT assets. Investigation of incidents. Reporting to management and regulators.
Visibility picture of the vulnerability of the entire network 24/7. Inventory of all IT assets, certificates and licenses. Automatic reporting of closed vulnerabilities and the state of infrastructure today. Monitoring and compliance with regulatory requirements. Equipment settings according to world standards GDPR, PCI DSS, ISO.
Vulnerability visibility on the network 24/7. Prioritize vulnerabilities from most critical to less important. Ways to solve and patch each of the vulnerabilities found, which allows to reduce the incident closure time to 2 hours. The report preparation time for the regulator and top management was reduced to 1 hour, which saves the resources of IS employees by 1 business day. An inventory of IT assets and licenses increased the productivity of procurement and IT staff by 4 times. Investigation of incidents was reduced to 2.5 hours.
one of the leaders of DLP solutions (Data Loss Prevention).
monitors and analyzes all passing user data and identifies leaks or possible risk data.
variety of network equipment on the market.
network equipment from one manufacturer.
reduction of equipment setup time.
Publication of confidential company data on social networks; leakage of your corporate or personal data.
through its accounts and accesses, it collects information according to the criteria specified by the customer and issues a report.
unreliable employees found in companies.
consolidation of a distributed network into a single virtual network.
using a cloud platform and end physical devices allows you to build a virtual network of the enterprise.
single point of administration, simplicity of settings allowed to reduce the requirements for the qualifications of duty administrators Encrypted tunnels, DNS Security, Cloud Firewall, Load Balance are now all in one device and controlled automatically by Machine Learning.
What do system administrators, database administrators, remote programmers do on your system? Who controls them? What actions led to data loss, inaccessibility of resources?
monitors and monitors the actions of privileged users of your network.
differentiation of access by device groups, access and action control, working hours, prohibition of critical teams, all this allowed to increase the level of performing discipline among privileged users and reduce incidents with a negligent attitude to work.