CYBER SECURITY SERVICES

Security Products & Services Portfolio
Security Products & Services Portfolio2018-11-14T03:31:07+00:00

Security Products & Services Portfolio

Endpoint Protection Solutions

Carbon Black – The Cb Predictive Security Cloud is Carbon Black’s consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud. It applies big data analytics across all endpoints, not just those on a single, local network to make predictions about, and provide protection from, current and future unknown attacks.

Trend Micro – You get multiple layers of advanced XGen threat and malware protection with techniques like high fidelity machine learning, behavioral analysis, exploit protection, advanced protection against ransomware variants, file reputation, intrusion protection, command and control blocking, browser exploit protection, application whitelisting, web reputation, sandbox integration and more

Palo Alto Networks – take a unique prevention-oriented approach to addressing advanced attacks on endpoints by identifying and blocking the techniques used by attackers as they attempt to exploit a vulnerability, or deliver malware directly to an endpoint.

Advanced Persistent Threat Solutions

FireEye– – provides the FireEye Malware Protection System is the next generation of threat protection focused on combating advanced malware, zero -day and targeted APT attacks. FireEye’s solutions supplement standard security defenses, such as traditional and next- generation firewalls, IPS, AV and Web gateways. Such defenses can’t stop advanced malware, leaving significant security holes in a majority of corporate networks.

Proofpoint – their Targeted Attack Prevention (TAP) solution provides real time monitoring of urls as well as providing real time analysis of email attachments to insure that the attachments do not contain malicious code. Proofpoint also provides a threat analysis service to help clients understand the proper remediation approach to any specific exploit.

Trend Micro Deep Discovery provides network-wide visibility, insight, and control to combat APTs and targeted attacks. For advanced threat protection, Deep Discovery uniquely detects and identifies evasive threats in real-time, then provides the in-depth analysis and relevant actionable intelligence to assess, remediate, and defend against targeted attacks in your organization.

Vetra Networks – delivers a new class of advanced persistent threat (APT) defense delivering real–time detection and analysis of active network breaches. Vectra technology picks up where perimeter security leaves off by providing deep, continuous analysis of both internal and Internet- bound network traffic to automatically detect all phases of a breach as attackers attempt to spy, spread, and steal within your network.

Zscaler – provides the Protect-Detect-Remediate defense framework for http/https traffic, which is a best practices approach for defending against APTs. Zscaler can provide a complete, integrated protect-detect-remediate defense for any IP enabled device in your organization.

Next Generation Firewall Solutions

Fortinet – The Fortinet Advanced Threat Protection Framework consists of three integrated elements, working hand-in-hand:

  • Prevent – Act on known threats and information

  • Detect – Identify unknown or unrecognizable threats

  • Mitigate – Respond to potential attacks

This 3-part framework is conceptually simple; however it covers a broad set of both advanced and traditional tools for network, application and endpoint security, threat detection, and mitigation. These tools are powered by strong research and threat intelligence capabilities that transform information into actionable protection.

Palo Alto Networks – provides a next generation firewall that provides application visibility, SSL decryption, content security, a VMWare-based virtualized firewall suite and the TRAPS endpoint to prevent infection.

Regulatory Compliance Solutions

Beyond Trust – provides an integrated Privileged Access Management platform that gives you comprehensive visibility into passwords, endpoints and servers standing between attackers and your critical data.

CyberArk – Ensures that controls are in place to centrally secure, manage and monitor privileged accounts. CyberArk delivers privileged password vaulting and user-access control, session recording and auditing, continuous monitoring, and forensics.

ForgeRock – provides an Identity Management platform for identity administration and automates user provisioning focused on managing relationships across users, devices and things. The platform is designed in response to the pain organizations suffer deploying legacy enterprise provisioning solutions.

Fox Technologies – BoKS ServerControl transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organization’s ability to enforce security policies and control access to critical systems and information.

PlainID – provides a simple and intuitive way for fast-paced organizations to create and managed their authorization policies.

Radiant Logic – Features three products designed to solve your toughest integration challenges, combining the best of enterprise, meta, and virtual directories to deliver identity as a federated service

SailPoint – Streamlines compliance, strengthens internal controls, and improves identity governance. Their innovative approach to identity management can help address any of the following challenges:

  • lower the cost of compliance

  • steer clear of audit deficiencies

  • streamline the access change and request management processes

  • effectively manage the user life-cycle

  • minimize access risk during a merger, acquisition, divestiture or layoff

SailPoint’s IdentityIQ provides automated provisioning solutions to handle all user lifecycle events, such as new hires, transfers, moves, and terminations. SailPoint’s automated provisioning can help you minimize the time your IT staff spends on repetitive processes and lower the cost of IT operations, while at the same time improving end user productivity.

Ping Identity’s UnboundID – A state–of–the–art, fully LDAPv3- compliant directory server designed for high performance concurrent processing.

Single Sign-On Solutions

Ping Identity – is recognized as identity leader by the Gartner Group. Ping has multiple product offerings.

PingFederate provides three Identity and Security capabilities.

  • Cloud Single Sign-On (SSO) using standard identity protocols; PingFederate allows employees, customers or partners access to multiple cloud resources using a single username and password.

  • Automated Cloud User Provisioning; PingFederate automatically creates user accounts in cloud applications whether you’re an enterprise sending employee attributes to a SaaS vendor or a cloud business creating accounts based on incoming.

  • Secures Web Services; Using industry standards, PingFederate’s Security Token Service allows applications to add identity information to their API.

PingOne provides Cloud Access Services to link an organization’s user directory to all of their cloud applications for a simple, proven and secure cloud identity management solution. Ping provides access to all your cloud apps with a single connection to your user directory.

CloudDesktop – With one set of credentials, users log in once to their user directory and gain immediate access to all their cloud applications from this customizable portal.

PingID – you can select from multiple methods and devices to authenticate. An easy one-touch swipe authentication from a mobile device is available, but when users leave their mobile device at home they can still securely sign on using a

range of alternative second factors such as voice, email, desktop application, Yubikey and Apple Watch.

PingAccess – can centrally manage authorization capabilities and secure both your applications and APIs in any domain, for users in any location.

Secure Messaging and Collaboration Solutions

Google Apps and Office 365

CTI Global provides Google Apps and Office 365 as cloud-based messaging and collaboration solutions. We offer migration services to assist clients with the migration to these solutions from existing platforms. In addition, we provide admin and end user training. We have experience migrating clients to these solutions from Exchange, GroupWise, Sun Microsystems/Oracle and Domino.

Both solutions comprise a suite of applications that include email, calendar, instant messaging, video conferencing, and secure document sharing. From an infrastructure perspective, Google and Microsoft manage performance, data backup, patch management and software upgrades. The combination of applications offered and application and platform management makes this solution cost effective while making users more productive.

Proofpoint – email protection stops malware and non-malware threats such as impostor email (also known as business email compromise, or BEC). Deployed as a cloud service or on-premises, it provides granular filtering to control bulk “graymail” and other unwanted email. In addition, business continuity capabilities keep email communications flowing, even when your email server fails.

Zixcorp is the preferred solution for insuring HIPAA compliance. ZixCorp’s Email Encryption Service let healthcare organizations instantly plug into the largest email encryption directory in the world. The ZixDirectory® boasts tens of millions of members. Once connected, users send and receive secure email without having to manage encryption keys. ZixCorp provides automated key management for its customers in a wide variety of industries, including financial services and government.

Zscaler – Provides web security as part of their massively scalable global Security as a Service platform that sits in-line between your company and the Internet, protecting your enterprise from cyber threats, stopping intellectual property leakage and ensuring compliance with corporate policies and statutory regulations. The Zscaler system scans all incoming and outgoing Internet (http/https) traffic irrespective of device or location, thus ensuring comprehensive security and compliance for today’s ‘boundary- less’ enterprises.

Virtual Machine Security Solutions

(including Amazon, Azure and Google cloud platforms)

CTI Global provides five native security applications (Trend Deep Security) for VMware and NSX platforms. These applications operate without requiring the installation of an agent(s) on VMware hosts, which makes for high performance and a strong ROI. The five applications are a Firewall, IDS/IPS, Log Management, Virtual Patching and Anti- Malware.

This suite of applications can operate with a unified management console scanning VMware implementations on both on premise infrastructure as well as public and private cloud infrastructures including AWS, Azure and Google cloud platforms.

Password Management Solutions

BeyondTrust – The PowerBroker Privileged Access Management Platform provides visibility and control over all privileged accounts and users. The results are simplified deployments, lower costs, stronger system security and reduced privilege risks.

CyberArk – Ensure the controls are in place to centrally secure, manage and monitor privileged accounts. CyberArk delivers privileged password vaulting and user-access control, session recording and auditing, continuous monitoring, and forensics.

Fox Technologies – BoKS ServerControl transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organization’s ability to enforce security policies and control access to critical systems and information.

PlainID – utilizes an innovative approach to simplify and optimize dynamic, fine-grained access to resources and data. Moving to the cloud, implementing mobile-based solutions and enhancing the on premise authorization control, becomes much easier with PlainID.

SailPoint – password management provides business users with an easy, intuitive way to change or reset passwords, while enforcing strong password policy across applications. By enabling end users to perform password reset and change requests themselves, you can significantly reduce the burden on your help desk staff while improving the enforcement of strong security policies.

Microsoft Identity Manager provides an identity management system that spans cloud and on-premises environments. This system provides a spectrum of services, including federation, identity management, device registration, user provisioning, application access control, and data protection. Its combination of Windows Server Active Directory, Microsoft Identity Manager, and Microsoft Azure Active Directory enables organizations to easily secure their modern hybrid infrastructure.

Mobile Security Solutions

Mobile Iron – Provides a complete security and management platform for mobile apps, mobile documents, and mobile devices that preserves the native experience for end users.

Movius – A second line service allows you to have two phone numbers on one mobile device. The second phone number is virtualized so there is no need to swap SIM cards or buy a dual SIM phone. The second line including SMS text can be encrypted as well as recorded.

Zixcorp – provides ZixOne, you can control access to corporate email without jeopardizing data protection or productivity, because corporate email never resides on the device. If a mobile device is lost or stolen, access is simply disabled. Employees maintain control of their devices and their privacy and liability risks are eliminated.

Secure Wireless

Fortinet infrastructure wireless controllers – Deliver a secure access solution for highly mobile organizations. Fortinet controllers for infrastructure Wi-Fi manage authentication, encryption and virtual private network connections for the wireless network. Policy enforcement and wireless intrusion prevention software can be added.

Website Attacks

Criminals masquerade as customer by co-opting real behavior, devices and identities. Shape Security prevents Credential Stuffing, Fake Accounts, Credit Application Fraud, Gift Card Cracking and Scraping.

Let's Connect

Whether you are looking for general assistance or have a specific project you want to discuss,
we are here to help.
Contact Us