Dynamic threats call for a dynamic approach.
Discover your assets
ConnectSecure uses several protocols to discover and probe network assets. This is useful to maintain a central asset repository and helps reduce risks and shadow IT.
Compliance Scans
ConnectSecure supports scanning a customer’s IT infrastructure for common cybersecurity compliance standards that make up the foundation of a strong cybersecurity strategy. Currently, ConnectSecure supports compliance standards like PCI DSS, HIPAA, GDPR IV, NIST 800-53, NIST 800-171, CIS, CIS 8.0, ISO 27002, Cyber Essentials, and Essential Eight.
Continuous vulnerability detection
ConnectSecure detects vulnerabilities in end-user devices like laptops and desktops as well as in network infrastructure, including servers, virtual machines, routers, access points, firewalls, printers, and more. ConnectSecure leverages several sources for gathering vulnerabilities, including the NIST’s National Vulnerability Database (NVD) and several OEM sources.
Application Patching
ConnectSecure includes an Application Patching feature that remediates the vulnerability by patching third-party Windows applications. This greatly reduces the risk exposure and helps safeguard the network from external actors.
Local and Cloud Active Directory Assessments
AD is the cornerstone of their network, holding the “keys to the kingdom” that need to be suitably protected. ConnectSecure helps perform AD assessments to identify misconfigurations, weak policies, and privileged user access.
Application baseline
All too often, users inadvertently install unauthorized applications or uninstall applications mandated by corporate policy. The disparate set of applications makes it difficult for a security practitioner to manage application vulnerabilities. ConnectSecure includes an application baseline scan to detect anomalies that can be mitigated with the help of any RMM tool.
External IP Scans
External scans show network weaknesses that could lead to a potential incident. External scans help detect open ports, protocols, and named vulnerabilities in public-facing network equipment such as web servers and firewalls.
Extensive reporting
ConnectSecure brings exceptionally strong reporting capabilities to the “Identify” space of the NIST CyberSecurity framework. Asset reports, Active Directory Reports, Vulnerabilities Reports, Compliance Reports, Security Posture Reports, and more are supported and available in standard Microsoft Office formats (Word, Excel, PowerPoint).
Comments