Supercharge your

revenue stream

Get your clients IT security sorted with quality products backed by excellent services and support.

What we are all about

Since opening our doors in 1998 we learned that being a leader in the IT Security Market requires the right strategy, the best team and an excellent supporting structure. Although these components are important, to be a leader in any market is determined by the way you lead by serving.

 

At Netxactics we work to lead by example, by serving the channel and our customers with passion, integrity, excellence and innovation. We will never claim to be perfect, but we will always stay in the game and remain committed to making sure end results are met.

What we do

Products

Sales

Services

Marketing

Our products are of the highest quality because we believe each client should get the quality they expect when it comes to IT security.

Our readily available account managers will assist with any sales queries, product or services quotes. We believe in long term sustainable relationships that enable business continuity and growth.

Our products are backed by excellent service and support. Our team is dedicated, qualified and experienced to assist with each of our products. We cover all the bases, from deployment right up to a remote support and reporting.

We offer marketing support to our partners through the creation of email campaigns, and marketing essentials for various applications.

"Love what you do and you'll do it well."

Products

Quote Request

Submitting Form...

Form submission unsuccessful.

Form received.

 

 

 

 

 

 

 

NETWORK

XG Firewall

The Next Thing in next-gen:

 

Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed to the way they report information and how they work with other security systems around them, giving you an unprecedented level of simplicity, insight, and advanced threat protection.

 

With an interface designed to eliminate unnecessary complexity, it enables you to use the powerful features without needing to become an IT security expert.

 

 

SG UTM

The Ultimate Network Security Package

 

With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to provide optimal performance, versatility, and efficiency to meet all your security needs.

 

The Sophos SG Series appliances are designed to provide the optimal balance between performance and protection – for diverse IT environments. Whether you need a solution for a small remote office, want to protect your school campus, or are a global organisation requiring high-availability and enterprise-grade features, our SG Series appliances are an ideal fit.

 

 

Secure Wi-Fi

Super secure super Wi-Fi

 

Sophos Wireless provides a simple, effective way to manage and secure your wireless networks. Managed from Sophos Central, it is easy to deploy as a standalone product or as part of your portfolio of cloud-managed solutions.

 

  •     Sophos Wireless managed from Sophos Central
  •     One dashboard for an at-a-glance status
  •     Simple deployment and administration
  •     Increased visibility and control
  •     Secure guest access and hotspot setup
  •     Multi-site management and cloud scalability

 

 

Secure Web Gateway

Complete web protection.

 

Sophos Web Gateway

  •     Reliable, globally-deployed cloud infrastructure
  •     Enterprise-grade Secure Web Gateway that’s advanced yet easy to use
  •     Manage all your Sophos Central security from one unified console
  •     Fast Lane technology that can speed up web browsing

 

The web is the number one source of threats, with 80% of them coming from legitimate, trusted sites. Sophos Web Gateway provides security, visibility, and control for all your desktop PCs, Macs, Chrome books, and mobile devices, regardless of how or where they access the web. And you get the simple, elegant management experience that is Sophos Central.

 

 

Secure Email Gateway

Simple protection for a complex problem

 

Sophos Email

  • Fast setup and easy integration
  • Proven anti-virus, anti-Spam, and anti-phishing
  • Email continuity with an end-user, self-service portal; spooling; and emergency inbox
  • Reliable, global Sophos-hosted infrastructure
  • Manage alongside endpoint, the web, and wireless in Sophos Central’s unified console

 

Sophos Email is a secure email gateway engineered to keep businesses safe from all email threats. It simply stops spam, phishing, malware and data loss and keeps your people productive. And if you want to consolidate protection it lets you control email security alongside endpoint, mobile, the web, and wireless protection from Sophos Central’s single interface.

 

 

 

XG FIREWALL DATASHEET

SG UTM DATASHEET

SECURE WI-FI DATASHEET

SECURE  WEB DATASHEET

SECURE  EMAIL DATASHEET

ENDUSER & SERVER

Endpoint Protection

Comprehensive security for users and data

 

Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and advanced threats, such as targeted attacks. Our next-generation endpoint protection integrates innovative technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. We also add web filtering, application control, device control and more right into the lightweight endpoint agent, so your organisation’s policies are enforced anywhere your users go.

 

 

Intercept X

A completely new approach to endpoint security

 

Sophos Intercept X adds next-generation signature-less technologies on top of your current endpoint security to give you complete, layered protection.

 

Sophos Intercept X uses multiple layers of technology, allowing you to create your own tailored next-generation endpoint security solution.

 

  •     Protect Vulnerable Software
  •     Effective Ransomware Detection
  •     Root Cause Analysis
  •     Add Next-Gen Protection to Your Traditional Security
  •     Simplify Management and Deployment

 

 

Mobile Control

Countless devices, one solution

 

Your users are accessing corporate data on their personal mobile devices more and more. However, this creates management and security challenges. Sophos Mobile Control allows you to keep your users productive while securing all of those different mobile devices with minimal IT effort.

 

  •     Mobile Content Management
  •     Mobile Device Management
  •     Mobile Application Management
  •     Mobile Email Management

 

 

SafeGuard Encryption

Protecting your data, wherever it goes

 

Sophos SafeGuard encrypts content as soon as it is created. The encryption is always on, allowing for seamless and secure collaboration. Synchronised Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data. This method of always-on protection goes everywhere your data goes, making it the most comprehensive data security solution on the market.

 

 

Server Protection

Security optimised for servers

 

Sophos Server Protection protects your server environment from malicious attacks while keeping your servers running at optimum performance. Designed to secure business critical servers, Sophos Server Protection includes server application white-listing, advanced anti-malware, and behaviour analysis. It’s server security made simple, providing protection for your Windows, Linux, and UNIX systems, and optimised for virtual environments.

 

  •     Better protection
  •     High-performance security built for servers
  •     Simple to use, including one-click Server Lockdown
  •     Cloud or on-premise management
  •     Security for every platform

 

 

Phish Threat

Reduce your largest attack surface

— your end users

 

A solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.

 

Phish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.

 

 

Sophos Home

Free protection for home computers

 

Sophos Home protects every Mac and PC in your home from malware, viruses, ransomware, and inappropriate websites. It uses the same award-winning technology that IT professionals trust to protect their businesses. Best of all, you can manage security settings for the whole family from any browser.

 

MOBILE SECURITY DATASHEET

SAFEGUARD DATASHEET

SERVER PROTECTION DATASHEET

MOBILE CONTROL DATASHEET

ENDPOINT PROTECTION DATASHEET

INTERCEPT X DATASHEET

PHISH THREAT DATASHEET

Rapid7 products make your data more productive, unlocking answers you can use to remediate vulnerabilities, detect breaches, enhance IT operations, and more. How? They collect operational data from across your entire ecosystem - logs, endpoints, everything - then apply real-time analytics powered by an unmatched understanding of attackers and IT operations. It’s a process that transforms your data into insight, prioritises it based on your business objectives, and helps coordinate workflow to resolve the problem.

 

 

insightVM

Live vulnerability management and endpoint analytics

 

The modern network is no longer comprised simply of servers and desktops; remote workers, cloud and virtualization, and mobile devices mean your risk exposure is changing every minute. Utilizing the power of Rapid7’s Insight Platform and the heritage of our award-winning Nexpose solution, InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize your risk.

 

Collect

Automatically collect, monitor, and analyze vulnerabilities on your network.

Prioritise

View real-time risks and leverage custom views tailored to your users.

Remediate

Provide IT with the data they need to fix quickly, then track progress in real-time.

INISIGHTVM DATASHEET

metasploit

Penetration testing software to help you act like the attacker

 

Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilising an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

Uncover Weaknesses

Find your vulnerabilities with

automated penetration tests powered by the world’s largest

exploit database.

Maximise Impact

Test and harden your people,

processes, and technology in

order of potential impact on

risk reduction.

Remediate Faster

Test your security program to

identify and more quickly fix

exposures.

METASPLOIT DATASHEET

appspider

Web application security testing to close the gaps in your apps

 

SPAs, APIs, mobile—the evolution of application technology is measured in months, not years. Is your web application security testing tool designed to keep up? AppSpider lets you collect all the information needed to test all the apps so that you aren’t left with gaping application risks.

 

The dynamic application security testing (DAST) solution crawls to the deepest, darkest corners of even the most modern and complex apps to effectively test for risk and get you the insight you need to remediate faster. With AppSpider on your side (or, rather, all of your sides), you’ll be able to scan all the apps today and always be ready for whatever comes next.

 

Keep Pace

Collect the info needed to test today’s ever-evolving apps.

Reduce Risk

Reduce risk with every build and remediate earlier in the SDLC.

Play Nice

Hand deliver the right insight the right way to DevOps.

APPSPIDER DATASHEET

insightIDR

Transform your data into actionable insight

 

Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.

Unify SIEM, UBA, and EDR

Augment reach across your entire ecosystem to find intruders early and get more from existing investments.

Detect Attacks Earlier

Detect intruders earlier in the attack chain so you can respond before critical data is compromised.

Prioritise Your Search

Uncover insight that is hidden in user activity, logs, and endpoints,

to make investigations

20x faster.

INSIGHTIDR DATASHEET

insightOPS

Your operations centre for endpoint visibility and infrastructure analytics.

 

InsightOps combines live endpoint visibility with log analytics, creating one console for total

infrastructure awareness.

Centralize Your Data

Easily centralize data from across your infrastructure in one secure location.

Search and Ask

Search logs and ask questions of your endpoints for immediate results.

Find Answers

Find answers with relevant context that enables you to solve problems fast.

INSIGHTOPS DATASHEET

Logentries

Centralized Logging. Simple and Free.

Logentries’ centralized logging service takes only minutes to setup and is free to use. Centralize logs from multiple sources and search using a simple query builder.

Collect & Centralize

Stream logs from all environments into Logentries’ centralized log server in real-time.

 

 

Search & Analyze

Search using basic keywords or our advanced query language for deeper analysis.

 

 

Visualize & Report

Build charts, graphs and alerts to monitor performance, user behavior and more.

 

API & Integrations

 

 

Open Source Extensions

Enjoy a large library of open source agents, libraries and other tools for extending Logentries’ logging server to meet your needs.

 

 

RESTful APIs

Logentries’ set of APIs makes it easy to leverage Logentries’ centralized logging service in whatever way works best for you.

DOWNLOAD A FREE TRIAL

SECURE PASSWORDS

 

Secret Server Privileged Account Management from Thycotic

Secret Server enables you to store, distribute, change, and audit enterprise passwords in a secure environment

 

  • Manage and Organise
  • Seamless Integration
  • Essential Compliance
  • Real-Time Management
  • Top-Level Security
  • Disaster Recovery

 

Secret Server On-premise

Secret Server on-premise enables you to Detect, control, distribute, Change, and audit passwords in a secure environment.

 

Secret Server Cloud

Privileged account password management software for IT Admins and IT Security Pros Automatically manage and secure your sensitive privileged passwords in minutes – with the power and affordability of the cloud.

 

 

Password Reset Server for Active Directory and Office 365 accounts

Your enterprise-level password reset solution

 

  • Secure Identity Verification
  • Windows Logon Integration and Web Portal
  • AD Attribute Maintenance
  • Custom Security Policies
  • Automated or Custom Enrollment
  • Section 508 Compliant

 

THYCOTIC OVERVIEW

THYCOTIC PAM DATASHEET

ENDPOINT PRIVILEGED ACCESS SECURITY SUITE

Proactive IT security from Thycotic to secure passwords, protect endpoints and control access

 

Why Security Professionals and IT Admins Love it

  • Only comprehensive yet simple multi-layered protection against ransomware and advanced threats
  • Easiest to manage, integrated security for endpoints and privileged account passwords
  • Enforces least privilege policies, and password best security practices without impacting productivity
  • Saves time and reduces help desk calls

 

Thycotic blocks cyber security attacks with multiple layers of security:

Keep attackers off endpoints

Stop malicious applications and Unix commands from running with Windows application white-listing, black-listing, and flexible greylisting. Now, you only give elevated privilege for approved applications and commands.

Enforce least privilege for everyone

Eliminate the ability for malware to run by automatically enforcing least privilege for everyone on your network through group policy. Reduce attack vectors by automatically finding and fixing OS configuration issues.

Protect privileged credentials

Discover, secure, and manage the use of privileged account passwords, continuously rotating passwords to prevent abuse. Monitor all privileged

password activity and alert for unusual behaviours or potential

PROTECT ENDPOINTS & CONTROL ACCESS

 

Privilege Manager for Windows

Privilege Manager for Windows protects your vulnerable endpoints with effective yet flexible application access control

Assures Comprehensive Application Control

Controls what apps can be installed, which can run with elevated access, and who gets appropriate privileges, for strong endpoint protection.

 

Simplifies Your Tasks

Gives you the simplest to use, easiest to manage and most flexible application control solution.

 

Speeds Time to Value

Provides rapid application discovery and policy templates that speed time to value and make privilege management a breeze.

 

Implements Least Privilege

You can assure least privilege access across applications without interfering with IT admin or employee productivity.

 

Demonstrates Compliance

Built in reports, such as applied policies or access approvals, help you meet compliance requirements for PCI, NIST, NERC CIP, SOX and more.

 

Integrates with Secret Server

Combining Thycotic’s endpoint security software with our leading privileged account password  software, you get complete multi-layered protection of your privileged credentials and endpoints.

Privilege Manager for Unix

Enhance your Secret Server security by enforcing least privilege on Unix/Linux root admin accounts!

Ensure privileged accounts are more secure by enforcing least privilege policies for Unix superusers without impacting their productivity.

 

 

Minimise the risk of data breaches and insider abuse associated with unauthorised access to, or escalated privileges of, Unix superuser accounts.

 

 

Demonstrate compliance with security policies and regulations by showing auditors that superuser privileges are effectively managed, monitored, controlled, and secure.

 

 

Save time and money by significantly reducing help desk calls and minimising Unix admin account management issues.

 

 

Enable Unix administrators to centrally manage and provision Unix accounts that are linked to AD.

 

 

Understand and prove to auditors what users are authorised to do with  root credentials.

Local Security Solution For Windows

Secure and lock down endpoints by controlling membership of local

groups with admin privileges, and any local group that can provide admin privileges.

 

Thycotic Local Security Solution For Windows Gives You The Ability To:

 

DISCOVER LOCAL USER/ACCOUNTS

Quickly identify local user accounts and which of those accounts have admin rights on each endpoint. Eliminate unknown groups with admin privileges to help protect and lock down your endpoints and maximise your privileged account security.

 

ENFORCE GROUP MEMBERSHIP POLICIES

Set policies to define what users belong in specific security groups and enforce least privilege best practice that says all users should be STANDARD USERS – a specific security context in Windows.

 

  • Assure only specific users are members of certain security groups (such as the Administrators group).
  • Help ensure any user account, not in a group that grants administrative rights is defined as a STANDARD USER – and these users do not get administrative rights on the endpoint.

 

ENSURE LIMITED PRIVILEGES ON USERS/ACCOUNTS

Create, maintain and manage user accounts on any endpoint, and determine which privileges are typically needed for each specific group.

 

 

 

 

Security Analysis Solution

Standards-based security configuration assessment with predefined and

customisable remediation actions to automate compliance.

 

Key Benefits With Thycotic’s Security Analysis Solution

 

Ensure your environments are secure and stable

Organisations need to address these security issues to reduce the risk of breach and maintain a secure network.

 

Demonstrate compliance

Organisations need to demonstrate that proper OS configurations are in place for compliance. Auditing is often done to expose Windows OS vulnerabilities and organisations need to show granular reporting and immediate and automated remediation.

 

Reduce organisational risk

Security misconfigurations and Windows Zero Day attacks are commonly executed attacks. Discovering these vulnerabilities and rapidly deploying fixes is a key component to a secure environment.

 

 

Group Management Server

Thycotic Group Management Server empowers non-IT business managers to securely manage their department’s Active Directory Groups without assigning them a privileged account. Using Group Management Server business department heads can easily manage their AD groups, ensuring the right people are included in their email groups, giving their staff the correct access to file systems. Group Management Server provides attestation of who has access to what, a major benefit in demonstrating proper governance and risk management.

 

  • Simply Secure
  • Easy to use tool
  • Efficient and affordable

SAS SOLUTION  DOC

LOCAL SECURITY SOLUTION

Virtual Machine Backup for Hyper-V and VMware

Choose a high performance Virtual Backup solution built for small and mid-market businesses

 

Built specifically for small and mid-market businesses

Altaro VM Backup is a fast, affordable, high performance backup solution, specially developed for small and mid-market businesses. We’ve cut the waste and hassle to give you an agile, streamlined solution that is easy to implement, feature-rich, with outstanding support as part of the package.

 

Efficient backup setup

Up and running quickly, without the need for complex configurations!

 

With Altaro VM Backup, you can install and run your first virtual machine (VM) backup in less than 15 minutes. Get up and running quickly, without the need for complex configurations or software dependencies.

 

Altaro VM Backup is designed to give you the power you need, without the hassle and steep learning curve.

 

  • Easy to use, intuitive UI - making it easy to implement a rock solid backup strategy
  • Managing and configuring backup/restore jobs across multiple hosts has never been simpler
  • Full control & scalability – Monitor and manage all your Hyper-V and VMware hosts from a single console

 

 

Full control of your backups

Powerful and fast centralised full control & scalability

 

Managing and configuring backup/restore jobs across multiple hosts has never been simpler.

 

  • Powerful functionality, easy to use - Offsite backup replication (with WAN acceleration), granular restore options for individual files and Exchange items, automated backup verification, and more!
  • Flexibility without the complexities – Simply drag and drop selected VMs to your chosen backup schedules and retention policies
  • Central management – a single pane of glass to manage all your Hyper-V and VMware backups from anywhere.

 

 

Best storage savings in the industry

 

Best deduplication in the industry - Augmented Inline Deduplication

 

Altaro VM Backup with Augmented Inline Deduplication drastically reduces your storage requirements for your backup repository. When compared to other vendors, it is the best deduplication in the industry creating the smallest backup size. Our deduplication runs across all backup jobs, you don’t need to group virtual machines together (no use of post processing). Requiring the least amount of backup space is only one of the benefits;Augmented Inline Deduplication also improves backup and restore speed.

 

  • Much lower storage requirements. When compared to other vendors Altaro creates the smallest backup size!
  • Faster backup and restore speed (less data to transfer)
  • Savings on storage requirements continue to improve as more VM backups are added
  • Augmented Inline Deduplication doesn’t tax server performance
  • Best deduplication in the industry not only for creating the smallest backup size but uses Variable Block Size for best efficiency.

 

 

FEATURES:

Augmented Inline Deduplication

 

Reduce backup storage requirements, and significantly speed up backups and restores.

Offsite backup

 

Replicate backups to an offsite location boosted with WAN acceleration or alternatively to a local network (LAN) path or set of rotated disks.

Boot VM

 

Instantly boot any VM version from the backup location and continue to restore data in the background.

Back up live VMs

 

Back up Hyper-V & VMware VMs with zero downtime by leveraging Microsoft VSS.

vCenter & CSV Support

 

Fully supports Cluster Shared Volumes (CSV) and VMware vCenter.

Fast Compression Algorithms

 

Leverage processors’ multithreading to boost up backup speed and reduce CPU requirements.

File & Exchange Item-Level Restore

 

Restore Individual Files or Exchange Items instantly from VM backups.

Automated test drills

 

Set an automated schedule to test the integrity of your backups for peace of mind

Flexible backup destinations

 

Multiple backup destinations for local backups and offsite copies.

Remote & Central console

 

Easily control, configure and monitor jobs for all your Hyper-V and VMware hosts, through a single console.

Flexible scheduling & queue

 

Schedule backups using grouped backup schedules or individual VMs.

RESOURCES

 

10 Essential Best practices for Virtual Server Backups by Brien M. Posey

 

Brien Posey outlines some of the fundamental best practices to consider when building your strategy for virtual server backups.

 

 

 

 

 

 

Altaro VM Backup Datasheet

 

 

 

 

DOWNLOAD

DOWNLOAD

Software Vulnerability Management

The Foundation to Reduce the Risk of Security Incidents Effectively

 

 

Vulnerability Management is a Prerequisite for Security

Software Vulnerability Management is a challenge for organizations of all sizes. It is an expansive discipline that cannot be addressed by technology alone, but must include policies, processes and technology.

 

It is quite common that policies are not aligned with business needs, that processes are not integrated and that technologies are not implemented to their full capabilities. The result of the misalignment is that, despite security investments, we continue to see organizations being breached and suffering significant losses as a consequence of the exploitation of known software vulnerabilities.

 

Flexera Software’s acclaimed Software Vulnerability Management solutions address these challenges, protecting companies and computers around the world.

 

 

Vulnerability Intelligence is the Foundation For Good Vulnerability Management

To successfully manage the software vulnerabilities in your environment you need to know all about them. We identified the urgency of this issue early on. Back in 2002, Secunia Research started investigating, coordinating disclosure and verifying software vulnerabilities. Today our in-house software vulnerability research remains the core of the Software Vulnerability Management products at Flexera Software.

 

Secunia Research is renowned for its accuracy, and is the guarantor that the information our customers receive through our solutions is much more than just information. It is verified intelligence, which has been scrutinized and rated before being submitted to our users in alerts customized to their environment and requirements. Our skilled and dedicated researchers work diligently to uncover and coordinate the disclosure of software vulnerabilities, and also to verify any software vulnerability reported by other sources. Secunia Research collects information from public disclosure lists and has custom-built robots crawl the internet for breaking news and rumors about new disclosures.

 

The result of this work is our Vulnerability Database, an unmatched catalog of over 50,000 applications which dates back to 2003. Our vulnerability research and our proprietary database are the foundation of our Software Vulnerability Management product portfolio which is developed to support the entire Software Vulnerability Management lifecycle.

 

 

Software Vulnerability Management Lifecycle

The Software Vulnerability Management lifecycle consists of three basic steps: Assess, Mitigate and Verify. In order to complete those steps a number of activities must be performed, supported by processes and technologies.

CSI DATASHEET

Corporate Software Inspector gives you the when, where, what and how of security patching. It tells you when a software vulnerability with an available patch is threatening your infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it.

 

Corporate Software Inspector includes an authenticated internal software inventory scanner. It can assess the security patch status of more than 20,000 programs running on Windows, Apple Mac OSX and Red Hat Enterprise Linux (RHEL) platforms. Corporate Software Inspector delivers software patching, configuration tools and hundreds of pre-configured patches for non-Microsoft applications running on Windows platforms.

 

The seamless integration with Microsoft System Center and Windows Server Update Services for security patch management means you maximise your investment and manage the patching of non-Microsoft products easily from within Microsoft System Center, using your existing infrastructure.

 

Features:

 

  •     Microsoft System Center Configuration Manager Integration
  •     Extensive Program Coverage
  •     Smart Groups
  •     Authenticated Scanning
  •     Corporate Software Inspector Package System (SPS)
  •     Scans Apple Mac OSX and RHEL
  •     Live Update
  •     User Management

 

 

 

 

 

Vulnerability Intelligence Manager leverages the intelligence from Flexera Research as the foundational layer to enable security and operations’ professionals to prioritise their work.

 

The combination of broad coverage, vulnerability intelligence provided by Flexera Research and management features makes it possible for organisations to assess risk based on the relative criticality of vulnerabilities in their own environment, driving the effective use of resources to prioritise mitigation actions with highest impact to reduce the attack surface for cyber criminals and hackers.

 

Features:

 

  •     Verified Intelligence
  •     Flexera Advisories
  •     Extensive Coverage
  •     Automate List of Applications to Monitor for Advisories
  •     Service Now and BMC Remedy Ticketing
  •     Comprehensive Management Features
  •     Effective Prioritisation of Mitigation Efforts

 

 

 

 

 

 

 

 

 

 

Personal Software Inspector is a security scanner which identifies programs that are insecure and need updates. It automates the updating of the majority of these programs, making it a lot easier to maintain a secure PC. It automatically detects insecure programs, downloads the required patches, and installs them accordingly without further user interaction.

 

Personal Software Inspector also detects and notifies you of programs that cannot be automatically updated with software patches and provides you with detailed instructions for updating the program when available. In most cases, you simply need to click the appropriate icon in the Results window and follow the on-screen instructions to install the latest patches.

 

Features:

 

  •     Automatic Update of Programs
  •     Available in 8 Languages
  •     Covers Programs from Thousands of Vendors
  •     Comprehensive Management Features
  •     Reports Security Status for Each Program
  •     Detects End-of-life Programs

 

VIM DATASHEET

Solve Your Mobile Workforce Productivity Challenges

 

For organizations that want to maximize the productivity of their mobile workforce, Bigtincan® transforms the way that sales and service organizations access, interact with, present, collaborate on and share content, as well as how they engage with customers when using their mobile devices. Organizations around the globe, and across all industries, rely on Bigtincan hub to ensure the productivity of their mobile workforce when using their mobile devices and make every customer interaction count.

 

  • One platform to deliver content to any mobile device, no matter where it resides
  • Delivers an amazing user experience that ensures user adoption
  • Embeds content into the way sales & service teams work
  • Powerful capabilities to create, customize, present & share content
  • Unlocks expert knowledge that can be shared across the entire team
  • Measure content utilization & financial impact to sales opportunities & revenues
  •  Customize the user experience to make it your app
  •  Complete security & multiple deployment options

 

 

Bigtincan® Hub

 

Bigtincan® Hub offers the most comprehensive security on the market that will meet the needs of the most stringent IT security teams. is a mobile, AI-powered sales enablement platform designed to increase sales team success by helping them better prepare for meetings, improve client and prospect engagement, enhance collaboration with peers, compress sales cycles, and improve overall win rates. Through its intuitive, premier user experience, Bigtincan Hub delivers real-time content recommendations, ensuring users have the right content to work in any situation and location, on or offline.

 

Bigtincan Hub delivers smarter, next generation sales enablement that will measurably help enterprise sales and service organizations boost productivity and success.

 

  • One Integrated, Intuitive Platform. Everything you need to access, customize, present, collaborate & share content while on a mobile device.
  • Incredible User Experience. Bigtincan® Hub delivers an incredible user experience that ensures rapid user adoption
  • Superior Content Experience. Automatically deliver the right content to the right mobile device users, regardless of where the content resides, directly to their mobile device. Content is organized based on relevance attributes and renders with complete fidelity on any mobile device.
  • Complete Content Security. Bigtincan Hub offers the most comprehensive security on the market that will meet the needs of the most stringent IT security teams.
  • Content Intelligence. Bigtincan’s Content Intelligence system provides visibility & fine-grained measurement of your content’s utilization as well as intelligence for content that is most relevant given a number of attributes such as a mobile user’s role, association, a company’s particular industry or customer type or content that’s best used at a particular stage in a process, time, location & more.
  • Powerful Communications Hub. Extend your communications capabilities. You now have the the ability to send secure messages between individual users or entire groups, real-time video and audio chatting, linking content to social networks, on-the-fly presentation broadcasting to remote meeting participants as well as the ability to subscribe and follow specific Bigtincan hub users and content in the system.

Bigtincan Forms™

 

Bigtincan Forms™ enables organizations to eliminate manual paper-based forms, automate data capture and implement processes improvements without requiring an entirely new infrastructure platform or stand alone forms application.

 

Interactive forms can be easily created and delivered to mobile device users in a matter of minutes, for use both on and offline. Data that’s captured in forms can be easily extracted and leveraged by back office systems to complete workflows and streamline transactions. Bigtincan Forms enables users to submit complete, media-rich and error-free forms, anywhere, from any mobile or desktop device, securely and in real time.

 

 

 

BETTER MOBILE-FORMS EXPERIENCE

 

  • No separate mobile app required to create, deliver or work with forms
  • Forms work across all mobile operating systems as well as on or offline
  • Forms data is automatically & centrally synced from mobile devices
  • Scan QR/barcodes, perform calculations, capture signatures, attach pictures
  • In-depth data analytics and reporting on forms usage
  • Role-based access controls (get the right forms to only the right users)
  • Complete data security (AES 256 encryption)

 

Bigtincan hub makes it easy to create and distribute forms to remote workforces on their mobile devices for checklists, order/repair sheets, surveys, inspections, audits, patient monitoring reports, site reviews, trip logs, project reports, quizzes, equipment checks and more. Bigtincan Forms enables users to submit complete, media-rich and error-free forms securely and in real time.

Bigtincan Studio™

 

With Bigtincan Studio™, powered by ScrollMotion®, users can easily create interactive mobile sales presentations that enable their sellers to tell stories and showcase their capabilities in far more compelling ways – leading to more impactful meetings, higher information retention, shortened sales cycles and more revenue.

 

Bigtincan Studio is fully integrated into Bigtincan Hub, enabling creators to share their touch-enabled content with designated users, update materials as needed, and measure usage. Very cool.

 

CREATE THE WOW. CLOSE THE DEAL. REPEAT.

 

  • Bigtincan Studio’s easy-to-use browser based design tool that enables designers, marketers and agencies to build beautiful touch-driven mobile sales apps that present content in a more engaging ways, without having to do any coding.
  • Browser-based easy-to-use design tool that creates interactive mobile sales content without any coding
  • Converts static PowerPoint or PDF presentations into dynamic, interactive touchscreen presentations that increase sales conversion rates
  • Amazing graphical approach demystifies the intricacies of complicated products & easily communicates complex information in ways that will wow the customer
  • Decreases seller prep time & increases face-to-face selling time with customers
  • Dynamic navigation easily adjusts content for the flow of the conversation with customers
  • Ensures that everyone uses the latest approved presentation, controls messaging & mitigates compliance risk.

 

Replace lengthy slide presentations with a single, powerful mobile sale app that delivers high impact content, increases the amount of time customers spend with sellers (on average 3 to 5 times longer per meeting) as well as increases a customer’s retention and recall of key sales messages.

 

 

Smarter, More Powerful Sales Enablement Capabilities

  • Prepare. Recommended content and real-time CRM intelligence delivered to any mobile device

 

  • Create. Create custom content, collateral, presentations, and dynamic sales playbooks on the fly

 

  • Engage. Engage your customers and transform the selling experience with more effective, interactive content

 

  • Share. Gain insight into how your customers view, share, and engage with your content via real time usage alerts and dynamic entry into CRM/SFA

 

  • Measure. Measure every content interaction by the team and uncover tribal knowledge within your organization. Understand how people work to help them work better.

Enterprise Random Password Manager

 

Enterprise Random Password ManagerTM (ERPM) is a Proactive Cyber Defense Platform that protects organizations against malicious insiders, advanced persistent threats (APTs) and other sophisticated cyber attacks – on-premises, in the cloud and in hybrid environments.

 

ERPM simplifies the management of your privileged credentials, delivering automated protection at scale, with a rapidly deployed and affordable solution.

 

 

ERPM continuously discovers and tracks privileged accounts on your cross-platform network, and automatically provides each account with unique and frequently changing credentials. It ensures that powerful privileged identities are only available to audited users on a temporary, delegated basis – preventing unauthorized and anonymous access to systems with sensitive data. ERPM secures privileged identities throughout your IT infrastructure, including:

 

  • Super-user login accounts utilized by individuals to change configuration settings, run programs and perform other IT administrative duties
  • Service accounts that require privileged login IDs and passwords to run, with dependencies across systems in numerous locations
  • Application credentials used by web services, line-of-business applications and custom software to connect to databases, middleware and more
  • SSH Keys that never expire and are widespread throughout your infrastructure
  • Cloud identities on a wide range of platforms including Office 365, Azure Active Directory, Amazon AWS, IBM SoftLayer, Rackspace and Force.com.

 

Enterprise Random Password Manager Delivers:

Proactive Cyber Defense

 

Establishes strong protection for your most critical assets inside the firewall with continuous privileged credential rotation and real-time, automated response to threats

Simplified Compliance

 

Achieves a comprehensive view of risk across privileged accounts for reporting and enforcing credential policies to meet your compliance requirements

Next-Generation Privileged Management

 

Ensures user, administrator, and contractor privileged access remains uncompromised, via automated, continuous privileged credential rotation

Automation at Scale

 

Reduces dependency on manual management of privileged credentials to reduce costs, improve IT responsiveness, and enable orchestration of large, dynamic environments at scale

Architecture

 

Enterprise Random Password Manager™ (ERPM) is an n-tiered, agentless privileged access management solution that secures large and complex enterprise networks. The ERPM architecture consists of:

N-Tier Platform

Platform Support and Enterprise Integrations

High Availability and Disaster Recovery

Scalability and Performance

Ease of Deployment

ERPM DATASHEET

Random Password Manager

 

Random Password ManagerTM (RPM) is a privileged identity management solution that helps protect your organization against cyber attacks that penetrate the network perimeter. It ensures that powerful privileged logins are only available to audited users on a temporary, delegated basis – preventing unauthorized and anonymous access to systems with sensitive data.

 

RPM is a subset of our Enterprise Random Password Manager™ (ERPM) cyber security platform. ERPM includes all the features of RPM, along with the ability to manage service accounts, application credentials and SSH keys.

 

 

Secure Privileged Access

 

RPM helps you eliminate the shared credentials that attackers exploit to gain lateral access within networks. It generates unique passwords for each privileged account, and then continuously updates the passwords. Even if a hacker obtains a user name and password, the information is of little value because the passwords are constantly changing.

 

As malicious programs and unauthorized users attempt to access your computers and applications, they encounter the unique, frequently changing credentials propagated by RPM. And when new devices are deployed with default passwords that could make your network vulnerable, RPM discovers and secures these credentials.

 

 

Improve IT Efficiency

 

Whenever IT personnel need privileged access for emergency firecall repairs, RPM allows temporary, audited retrieval of current passwords on demand. And by automatically generating new passwords for each administrator and root account, RPM saves your IT staff valuable time that they would otherwise spend doing manual changes. Disclosed credentials are randomized immediately after use, so no one retains long-term knowledge of password secrets.

 

RPM also grants fast, automated access to corporate applications – whether on-premises or in the cloud – without disclosing passwords. Elevated operations performed by users are recorded and audited using RPM’s automatic session recording module.

 

 

Achieve Regulatory Compliance

 

Whenever you must prove compliance with regulatory mandates such as PCI-DSS, Sarbanes-Oxley, HIPAA, FISMA, and others, RPM generates timely, detailed reports. Each time IT staff request privileged access, RPM creates an audit trail showing the requester, target system and account, date and time, and purpose of the request. You get the information you need to ensure that security and compliance goals are met, and gain business intelligence to improve daily IT operations.

 

  • Rapid Deployment — installs on global networks in days instead of months to lower your cost of ownership

 

  • True DiscoverySM — automatically discovers, secures and reports on privileged credentials with the least amount of manual intervention

 

  • Easy Integration — with a few mouse clicks integrates with helpdesk software, SIEM, multi-factor authentication, and more

 

  • Open Platform Architecture — using an industry standard
  • Web services architecture, integrates with Identity and
  • Access Management systems to promote quick adoption and give users missing IAM capabilities through a familiar interface

 

  • Stress-free Maintenance — upgrades are included in the cost of support and are installed quickly by in-house IT staff without the need for professional services

RPM DATASHEET

A  1 0 0 0   B U S I N E S S   C H A L L E N G E S ?

Your clients IT security doesn't have to be one of them.

Sales

Our readily available account managers will assist with any sales queries, product or services quotes. We believe in long term sustainable relationships that enables business continuity and growth.

What we can assist with

Quotations

We can assist with quotations on any of our products or services.

Training

We can assist with booking training for your client for the relevant product sets.

POCs

 We can schedule a proof of concept for any of our related product sets.

Sign up to become a partner

Submitting Form...

Form submission unsuccessful.

Form received.

'Two heads are always better than one.'

 

Send through your request and we will contact you with the relevant information needed to complete your registration.

Services

Deployment

 

Let us get things up and running

 

This service is a supported service, which constitutes that a Netxactics engineer will support your technical team in deploying the product across your organisation.

Maintenance

 

We'll keep an eye on things

 

Through scheduled health checks and reporting, the Maintenance Service removes the burden of routine maintenance and enables you to focus on more pressing projects.

Workshops

 

Let us train you and certify you

 

These workshops are intended to provide a proper understanding of the platform to enable effective administration, deployment and maintenance of the solution.

Reporting

 

Need visibility? No problem

 

Detailed reporting provides an accurate health status on the solution deployed in your network..

On-site Call Out

 

Call us, we’ll be there to assist on-site

 

Netxactics On-site Support is a prepaid service, where hourly bundles of 10, 20 or 30 hours can be purchased upfront. Alternatively, we can arrange a billed-per-hour on-site support.

Telephonic & Email Support

 

Need assistance?

Give us a shout, we’d love to help

 

Netxactics Premium Telephonic & Email Support offers experienced technical support for the operation of the Netxactics product offerings.

Remote Support

 

Need help, no matter where you are we can log in and assist

 

Netxactics Remote Support offers a flexible and effective way to gain access to experienced Netxactics Services engineers to assist you remotely with a solution, independent of geographical location.

Request a services quote

Submitting Form...

Form submission unsuccessful.

Form received.

Training

We offer training on the below products.

 

Please request training by completing the form. Dates and times will be communicated upon making a request.

 

 

All training sessions are hosted at the Netxactics offices.

Sophos UTM Training

Sophos EndUser Protection Training

Sophos SafeGuard Enterprise Training

Engineer Training

(Non-Certified)

 

UTM/XG Product

 

3 Days Training

 

Costing is available per

booking or request

 

Max 6 attendees allowed

EndUser Protection

Training

(Non-Certified)

 

Endpoint SMC

 

3 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

Sophos SafeGuard

Enterprise

(Non-Certified)

 

SafeGuard Enterprise / Full Disk /  Native / Cloud / File & Folder / Data Exchange

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

Rapid7 Training

InsightVM  Training

(Certified)

 

InsightVM (Nexpose)

 

2 Days Training

 

Costing is available per booking or request

 

Max 10 attendees allowed

 

Held at the NX Offices & Online

Metasploit Training

(Certified)

 

Metasploit

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

 

Held at the NX Offices & Online

Appspider Training

(Certified)

 

Appspider

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

InsightIDR Training

(Certified)

 

InsightIDR

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

Submitting Form...

Form submission unsuccessful.

Form received.

Book a Training Session

Marketing

We offer marketing support to our partners through the creation of email campaigns, and marketing essentials for various applications.

What we can assist with

Email Campaigns

 

We can assist with the creation of an email campaign about any of our products in HTML format to use in a focused campaign to your clients.

Printed Media

 

Should you need an advert, data-sheet, diagram or any design related to one of our products, we can assist with a design for your specific application.

Online Application

 

You can download our marketing essentials that contain the needed logo's, product summaries and related collateral for use on your website or other Online applications.

Partner End User Events

 

We have the needed resources to assist in planning and executing an end user product-focused event. We can help plan it, create invites and execute on the day of the event.

Download Your Marketing Essentials

Need help with anything? Give us a shout

Submitting Form...

Form submission unsuccessful.

Form received.

Johannesburg Head Office

T +27 11 444 4000

F +27 11 444 7000

info@nx.co.za

 

Physical Address

164 Katherine Street

Pinmill Farm

Block F, Lower level

Sandton

2416

 

Cape Town Branch Office

T +27 21 526 0455

F +27 21 526 0311

info@nx.co.za

 

Physical Address

Foyer 3, Century Way,

Century City

Cape Town

7441

Port Elizabeth Branch Office

T +27 21 526 0455

F +27 21 526 0311

info@nx.co.za

 

 

 

 

 

 

 

NETWORK

XG Firewall

The Next Thing in next-gen:

 

Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed to the way they report information and how they work with other security systems around them, giving you an unprecedented level of simplicity, insight, and advanced threat protection.

 

With an interface designed to eliminate unnecessary complexity, it enables you to use the powerful features without needing to become an IT security expert.

 

 

SG UTM

The Ultimate Network Security Package

 

With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to provide optimal performance, versatility, and efficiency to meet all your security needs.

 

The Sophos SG Series appliances are designed to provide the optimal balance between performance and protection – for diverse IT environments. Whether you need a solution for a small remote office, want to protect your school campus, or are a global organisation requiring high-availability and enterprise-grade features, our SG Series appliances are an ideal fit.

 

 

Secure Wi-Fi

Super secure super Wi-Fi

 

Sophos Wireless provides a simple, effective way to manage and secure your wireless networks. Managed from Sophos Central, it is easy to deploy as a standalone product or as part of your portfolio of cloud-managed solutions.

 

 

Secure Web Gateway

Complete web protection.

 

The web is the number one source of threats, with 80% of them coming from legitimate, trusted sites. Sophos Web Gateway provides security, visibility, and control for all your desktop PCs, Macs, Chrome books, and mobile devices, regardless of how or where they access the web. And you get the simple, elegant management experience that is Sophos Central.

 

 

Secure Email Gateway

Simple protection for a complex problem

 

Sophos Email is a secure email gateway engineered to keep businesses safe from all email threats. It simply stops spam, phishing, malware and data loss and keeps your people productive. And if you want to consolidate protection it lets you control email security alongside endpoint, mobile, the web, and wireless protection from Sophos Central’s single interface.

 

 

 

XG FIREWALL DATASHEET

SG UTM DATASHEET

SECURE WI-FI DATASHEET

SECURE  WEB DATASHEET

SECURE  EMAIL DATASHEET

ENDUSER & SERVER

Endpoint Protection

Comprehensive security for users and data

 

Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and advanced threats, such as targeted attacks. Our next-generation endpoint protection integrates innovative technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. We also add web filtering, application control, device control and more right into the lightweight endpoint agent, so your organisation’s policies are enforced anywhere your users go.

 

 

Intercept X

A completely new approach to endpoint security

 

Sophos Intercept X adds next-generation signature-less technologies on top of your current endpoint security to give you complete, layered protection. Sophos Intercept X uses multiple layers of technology, allowing you to create your own tailored next-generation endpoint security solution.

 

 

Mobile Control

Countless devices, one solution

 

Your users are accessing corporate data on their personal mobile devices more and more. However, this creates management and security challenges. Sophos Mobile Control allows you to keep your users productive while securing all of those different mobile devices with minimal IT effort.

 

 

SafeGuard Encryption

Protecting your data, wherever it goes

 

Sophos SafeGuard encrypts content as soon as it is created. The encryption is always on, allowing for seamless and secure collaboration. Synchronised Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data. This method of always-on protection goes everywhere your data goes, making it the most comprehensive data security solution on the market.

 

 

Server Protection

Security optimised for servers

 

Sophos Server Protection protects your server environment from malicious attacks while keeping your servers running at optimum performance. Designed to secure business critical servers, Sophos Server Protection includes server application white-listing, advanced anti-malware, and behaviour analysis. It’s server security made simple, providing protection for your Windows, Linux, and UNIX systems, and optimised for virtual environments.

 

 

Phish Threat

Reduce your largest attack surface — your end users

 

A solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.

 

Phish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.

 

 

Sophos Home

Free protection for home computers

 

Sophos Home protects every Mac and PC in your home from malware, viruses, ransomware, and inappropriate websites. It uses the same award-winning technology that IT professionals trust to protect their businesses. Best of all, you can manage security settings for the whole family from any browser.

 

PHISH THREAT DATASHEET

SERVER PROTECTION DATASHEET

SAFEGUARD DATASHEET

MOBILE CONTROL DATASHEET

MOBILE SECURITY DATASHEET

INTERCEPT X DATASHEET

ENDPOINT PROTECTION DATASHEET

Rapid7 products make your data more productive, unlocking answers you can use to remediate vulnerabilities, detect breaches, enhance IT operations, and more. How? They collect operational data from across your entire ecosystem - logs, endpoints, everything - then apply real-time analytics powered by an unmatched understanding of attackers and IT operations. It’s a process that transforms your data into insight, prioritises it based on your business objectives, and helps coordinate workflow to resolve the problem.

 

 

insightVM

Live vulnerability management and endpoint analytics

 

The modern network is no longer comprised simply of servers and desktops; remote workers, cloud and virtualization, and mobile devices mean your risk exposure is changing every minute. Utilizing the power of Rapid7’s Insight Platform and the heritage of our award-winning Nexpose solution, InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize your risk.

 

INISIGHTVM DATASHEET

Collect

Automatically collect, monitor, and analyze vulnerabilities on your network.

Prioritise

View real-time risks and leverage custom views tailored to your users.

Remediate

Provide IT with the data they need to fix quickly, then track progress in real-time.

metasploit

Penetration testing software to help you act like the attacker

 

Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilising an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

METASPLOIT DATASHEET

Uncover Weaknesses

Find your vulnerabilities with

automated penetration tests powered by the world’s largest

exploit database.

Maximise Impact

Test and harden your people,

processes, and technology in

order of potential impact on

risk reduction.

Remediate Faster

Test your security program to

identify and more quickly fix

exposures.

appspider

Web application security testing to close the gaps in your apps

 

SPAs, APIs, mobile—the evolution of application technology is measured in months, not years. Is your web application security testing tool designed to keep up? AppSpider lets you collect all the information needed to test all the apps so that you aren’t left with gaping application risks.

 

The dynamic application security testing (DAST) solution crawls to the deepest, darkest corners of even the most modern and complex apps to effectively test for risk and get you the insight you need to remediate faster. With AppSpider on your side (or, rather, all of your sides), you’ll be able to scan all the apps today and always be ready for whatever comes next.

 

APPSPIDER DATASHEET

Keep Pace

Collect the info needed to test today’s ever-evolving apps.

Reduce Risk

Reduce risk with every build and remediate earlier in the SDLC.

Play Nice

Hand deliver the right insight the right way to DevOps.

insightIDR

Transform your data into actionable insight

 

Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.

Prioritise Your Search

Uncover insight that is hidden in user activity, logs, and endpoints,

to make investigations

20x faster.

Unify SIEM, UBA, and EDR

Augment reach across your entire ecosystem to find intruders early and get more from existing investments.

Detect Attacks Earlier

Detect intruders earlier in the attack chain so you can respond before critical data is compromised.

INSIGHTIDR DATASHEET

insightOPS

Your operations centre for endpoint visibility and infrastructure analytics.

 

InsightOps combines live endpoint visibility with log analytics, creating one console for total infrastructure awareness.

INSIGHTOPS DATASHEET

Centralize Your Data

Easily centralize data from across your infrastructure in one secure location.

Search and Ask

Search logs and ask questions of your endpoints for immediate results.

Find Answers

Find answers with relevant context that enables you to solve problems fast.

Logentries

Centralized Logging. Simple and Free.

Logentries’ centralized logging service takes only minutes to setup and is free to use. Centralize logs from multiple sources and search using a simple query builder.

Collect & Centralize

Stream logs from all environments into Logentries’ centralized log server in real-time.

 

 

Search & Analyze

Search using basic keywords or our advanced query language for deeper analysis.

 

 

Visualize & Report

Build charts, graphs and alerts to monitor performance, user behavior and more.

 

DOWNLOAD FREE TRIAL

SECURE PASSWORDS

Secret Server Privileged Account Management from Thycotic

Secret Server enables you to store, distribute, change, and audit enterprise passwords in a secure environment

 

  • Manage and Organise
  • Seamless Integration
  • Essential Compliance
  • Real-Time Management
  • Top-Level Security
  • Disaster Recovery

 

Secret Server On-premise

Secret Server on-premise enables you to Detect, control, distribute, Change, and audit passwords in a secure environment.

 

Secret Server Cloud

Privileged account password management software for IT Admins and IT Security Pros Automatically manage and secure your sensitive privileged passwords in minutes – with the power and affordability of the cloud.

 

 

Password Reset Server for Active Directory and Office 365 accounts

Your enterprise-level password reset solution

 

  • Secure Identity Verification
  • Windows Logon Integration and Web Portal
  • AD Attribute Maintenance
  • Custom Security Policies
  • Automated or Custom Enrollment
  • Section 508 Compliant

 

THYCOTIC OVERVIEW

THYCOTIC PAM DATASHEET

ENDPOINT PRIVILEGED ACCESS SECURITY SUITE

 

Proactive IT security from Thycotic to secure passwords, protect endpoints and control access

 

Why Security Professionals and IT Admins Love it

  • Only comprehensive yet simple multi-layered protection against ransomware and advanced threats
  • Easiest to manage, integrated security for endpoints and privileged account passwords
  • Enforces least privilege policies, and password best security practices without impacting productivity
  • Saves time and reduces help desk calls

 

Thycotic blocks cyber security attacks with multiple layers of security:

Keep attackers off endpoints

Stop malicious applications and Unix commands from running with Windows application white-listing, black-listing, and flexible greylisting. Now, you only give elevated privilege for approved applications and commands.

Enforce least privilege for everyone

Eliminate the ability for malware to run by automatically enforcing least privilege for everyone on your network through group policy. Reduce attack vectors by automatically finding and fixing OS configuration issues.

Protect privileged credentials

Discover, secure, and manage the use of privileged account passwords, continuously rotating passwords to prevent abuse. Monitor all privileged

password activity and alert for unusual behaviours or potential

PROTECT ENDPOINTS & CONTROL ACCESS

 

Privilege Manager for Windows

Privilege Manager for Windows protects your vulnerable endpoints with effective yet flexible application access control

  • Assures Comprehensive Application Control Controls what apps can be installed, which can run with elevated access, and who gets appropriate privileges, for strong endpoint protection.
  • Simplifies Your Tasks Gives you the simplest to use, easiest to manage and most flexible application control solution.
  • Speeds Time to Value Provides rapid application discovery and policy templates that speed time to value and make privilege management a breeze.
  • Implements Least Privilege You can assure least privilege access across applications without interfering with IT admin or employee productivity.
  • Demonstrates Compliance Built in reports, such as applied policies or access approvals, help you meet compliance requirements for PCI, NIST, NERC CIP, SOX and more.
  • Integrates with Secret Server Combining Thycotic’s endpoint security software with our leading privileged account password  software, you get complete multi-layered protection of your privileged credentials and endpoints.

Privilege Manager for Unix

Enhance your Secret Server security by enforcing least privilege on Unix/Linux root admin accounts!

 

  • Ensure privileged accounts are more secure by enforcing least privilege policies for Unix superusers without impacting their productivity.
  • Minimise the risk of data breaches and insider abuse associated with unauthorised access to, or escalated privileges of, Unix superuser accounts.
  • Demonstrate compliance with security policies and regulations by showing auditors that superuser privileges are effectively managed, monitored, controlled, and secure.
  • Save time and money by significantly reducing help desk calls and minimising Unix admin account management issues.
  • Enable Unix administrators to centrally manage and provision Unix accounts that are linked to AD.
  • Understand and prove to auditors what users are authorised to do with  root credentials.

 

Local Security Solution For Windows

Secure and lock down endpoints by controlling membership of local

groups with admin privileges, and any local group that can provide admin privileges.

 

Thycotic Local Security Solution For Windows Gives You The Ability To:

 

DISCOVER LOCAL USER/ACCOUNTS

Quickly identify local user accounts and which of those accounts have admin rights on each endpoint. Eliminate unknown groups with admin privileges to help protect and lock down your endpoints and maximise your privileged account security.

 

  • ENFORCE GROUP MEMBERSHIP POLICIES
  • ENSURE LIMITED PRIVILEGES ON USERS/ACCOUNTS

 

Security Analysis Solution

Standards-based security configuration assessment with predefined and

customisable remediation actions to automate compliance.

 

Key Benefits With Thycotic’s Security Analysis Solution

 

  • Ensure your environments are secure and stable
  • Demonstrate compliance
  • Reduce organisational risk

 

 

Group Management Server

Thycotic Group Management Server empowers non-IT business managers to securely manage their department’s Active Directory Groups without assigning them a privileged account. Using Group Management Server business department heads can easily manage their AD groups, ensuring the right people are included in their email groups, giving their staff the correct access to file systems. Group Management Server provides attestation of who has access to what, a major benefit in demonstrating proper governance and risk management.

 

SAS SOLUTION  DOC

LOCAL SECURITY SOLUTION

Virtual Machine Backup for Hyper-V and VMware

Choose a high performance Virtual Backup solution built for small and mid-market businesses

 

Built specifically for small and mid-market businesses

Altaro VM Backup is a fast, affordable, high performance backup solution, specially developed for small and mid-market businesses. We’ve cut the waste and hassle to give you an agile, streamlined solution that is easy to implement, feature-rich, with outstanding support as part of the package.

 

Efficient backup setup

Up and running quickly, without the need for complex configurations!

 

With Altaro VM Backup, you can install and run your first virtual machine (VM) backup in less than 15 minutes. Get up and running quickly, without the need for complex configurations or software dependencies.

 

Altaro VM Backup is designed to give you the power you need, without the hassle and steep learning curve.

 

  • Easy to use, intuitive UI - making it easy to implement a rock solid backup strategy
  • Managing and configuring backup/restore jobs across multiple hosts has never been simpler
  • Full control & scalability – Monitor and manage all your Hyper-V and VMware hosts from a single console

 

 

Full control of your backups

Powerful and fast centralised full control & scalability

 

Managing and configuring backup/restore jobs across multiple hosts has never been simpler.

 

  • Powerful functionality, easy to use - Offsite backup replication (with WAN acceleration), granular restore options for individual files and Exchange items, automated backup verification, and more!
  • Flexibility without the complexities – Simply drag and drop selected VMs to your chosen backup schedules and retention policies
  • Central management – a single pane of glass to manage all your Hyper-V and VMware backups from anywhere.

 

 

Best storage savings in the industry

 

Best deduplication in the industry - Augmented Inline Deduplication

 

Altaro VM Backup with Augmented Inline Deduplication drastically reduces your storage requirements for your backup repository. When compared to other vendors, it is the best deduplication in the industry creating the smallest backup size. Our deduplication runs across all backup jobs, you don’t need to group virtual machines together (no use of post processing). Requiring the least amount of backup space is only one of the benefits;Augmented Inline Deduplication also improves backup and restore speed.

 

  • Much lower storage requirements. When compared to other vendors Altaro creates the smallest backup size!
  • Faster backup and restore speed (less data to transfer)
  • Savings on storage requirements continue to improve as more VM backups are added
  • Augmented Inline Deduplication doesn’t tax server performance
  • Best deduplication in the industry not only for creating the smallest backup size but uses Variable Block Size for best efficiency.

 

 

FEATURES:

Augmented Inline Deduplication

 

Reduce backup storage requirements, and significantly speed up backups and restores.

Offsite backup

 

Replicate backups to an offsite location boosted with WAN acceleration or alternatively to a local network (LAN) path or set of rotated disks.

Boot VM

 

Instantly boot any VM version from the backup location and continue to restore data in the background.

Back up live VMs

 

Back up Hyper-V & VMware VMs with zero downtime by leveraging Microsoft VSS.

vCenter & CSV Support

 

Fully supports Cluster Shared Volumes (CSV) and VMware vCenter.

Fast Compression Algorithms

 

Leverage processors’ multithreading to boost up backup speed and reduce CPU requirements.

File & Exchange Item-Level Restore

 

Restore Individual Files or Exchange Items instantly from VM backups.

Automated test drills

 

Set an automated schedule to test the integrity of your backups for peace of mind

Flexible backup destinations

 

Multiple backup destinations for local backups and offsite copies.

Flexible scheduling & queue

 

Schedule backups using grouped backup schedules or individual VMs.

Remote & Central console

 

Easily control, configure and monitor jobs for all your Hyper-V and VMware hosts, through a single console.

RESOURCES

 

10 Essential Best practices for Virtual Server Backups by Brien M. Posey

 

Brien Posey outlines some of the fundamental best practices to consider when building your strategy for virtual server backups.

 

 

 

 

 

Altaro VM Backup Datasheet

 

 

 

 

DOWNLOAD

DOWNLOAD

Software Vulnerability Management

The Foundation to Reduce the Risk of Security Incidents Effectively

 

 

Vulnerability Management is a Prerequisite for Security

Software Vulnerability Management is a challenge for organizations of all sizes. It is an expansive discipline that cannot be addressed by technology alone, but must include policies, processes and technology.

 

It is quite common that policies are not aligned with business needs, that processes are not integrated and that technologies are not implemented to their full capabilities. The result of the misalignment is that, despite security investments, we continue to see organizations being breached and suffering significant losses as a consequence of the exploitation of known software vulnerabilities.

 

Flexera Software’s acclaimed Software Vulnerability Management solutions address these challenges, protecting companies and computers around the world.

 

 

Vulnerability Intelligence is the Foundation For Good Vulnerability Management

To successfully manage the software vulnerabilities in your environment you need to know all about them. We identified the urgency of this issue early on. Back in 2002, Secunia Research started investigating, coordinating disclosure and verifying software vulnerabilities. Today our in-house software vulnerability research remains the core of the Software Vulnerability Management products at Flexera Software.

 

Secunia Research is renowned for its accuracy, and is the guarantor that the information our customers receive through our solutions is much more than just information. It is verified intelligence, which has been scrutinized and rated before being submitted to our users in alerts customized to their environment and requirements. Our skilled and dedicated researchers work diligently to uncover and coordinate the disclosure of software vulnerabilities, and also to verify any software vulnerability reported by other sources. Secunia Research collects information from public disclosure lists and has custom-built robots crawl the internet for breaking news and rumors about new disclosures.

 

The result of this work is our Vulnerability Database, an unmatched catalog of over 50,000 applications which dates back to 2003. Our vulnerability research and our proprietary database are the foundation of our Software Vulnerability Management product portfolio which is developed to support the entire Software Vulnerability Management lifecycle.

 

 

Software Vulnerability Management Lifecycle

The Software Vulnerability Management lifecycle consists of three basic steps: Assess, Mitigate and Verify. In order to complete those steps a number of activities must be performed, supported by processes and technologies

Corporate Software Inspector gives you the when, where, what and how of security patching. It tells you when a software vulnerability with an available patch is threatening your infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it.

 

Corporate Software Inspector includes an authenticated internal software inventory scanner. It can assess the security patch status of more than 20,000 programs running on Windows, Apple Mac OSX and Red Hat Enterprise Linux (RHEL) platforms. Corporate Software Inspector delivers software patching, configuration tools and hundreds of pre-configured patches for non-Microsoft applications running on Windows platforms.

 

The seamless integration with Microsoft System Center and Windows Server Update Services for security patch management means you maximise your investment and manage the patching of non-Microsoft products easily from within Microsoft System Center, using your existing infrastructure.

 

Features:

 

  •     Microsoft System Center Configuration Manager Integration
  •     Extensive Program Coverage
  •     Smart Groups
  •     Authenticated Scanning
  •     Corporate Software Inspector Package System (SPS)
  •     Scans Apple Mac OSX and RHEL
  •     Live Update
  •     User Management

CSI DATASHEET

Vulnerability Intelligence Manager leverages the intelligence from Flexera Research as the foundational layer to enable security and operations’ professionals to prioritise their work.

 

The combination of broad coverage, vulnerability intelligence provided by Flexera Research and management features makes it possible for organisations to assess risk based on the relative criticality of vulnerabilities in their own environment, driving the effective use of resources to prioritise mitigation actions with highest impact to reduce the attack surface for cyber criminals and hackers.

 

Features:

 

  •     Verified Intelligence
  •     Flexera Advisories
  •     Extensive Coverage
  •     Automate List of Applications to Monitor for Advisories
  •     Service Now and BMC Remedy Ticketing
  •     Comprehensive Management Features
  •     Effective Prioritisation of Mitigation Efforts

 

 

 

 

 

 

Personal Software Inspector is a security scanner which identifies programs that are insecure and need updates. It automates the updating of the majority of these programs, making it a lot easier to maintain a secure PC. It automatically detects insecure programs, downloads the required patches, and installs them accordingly without further user interaction.

 

Personal Software Inspector also detects and notifies you of programs that cannot be automatically updated with software patches and provides you with detailed instructions for updating the program when available. In most cases, you simply need to click the appropriate icon in the Results window and follow the on-screen instructions to install the latest patches.

 

Features:

 

  •     Automatic Update of Programs
  •     Available in 8 Languages
  •     Covers Programs from Thousands of Vendors
  •     Comprehensive Management Features
  •     Reports Security Status for Each Program
  •     Detects End-of-life Programs

 

VIM DATASHEET

Solve Your Mobile Workforce Productivity Challenges

 

For organizations that want to maximize the productivity of their mobile workforce, Bigtincan® transforms the way that sales and service organizations access, interact with, present, collaborate on and share content, as well as how they engage with customers when using their mobile devices. Organizations around the globe, and across all industries, rely on Bigtincan hub to ensure the productivity of their mobile workforce when using their mobile devices and make every customer interaction count.

 

  • One platform to deliver content to any mobile device, no matter where it resides
  • Delivers an amazing user experience that ensures user adoption
  • Embeds content into the way sales & service teams work
  • Powerful capabilities to create, customize, present & share content
  • Unlocks expert knowledge that can be shared across the entire team
  • Measure content utilization & financial impact to sales opportunities & revenues
  •  Customize the user experience to make it your app
  •  Complete security & multiple deployment options

 

 

Bigtincan® Hub

 

Bigtincan® Hub offers the most comprehensive security on the market that will meet the needs of the most stringent IT security teams. is a mobile, AI-powered sales enablement platform designed to increase sales team success by helping them better prepare for meetings, improve client and prospect engagement, enhance collaboration with peers, compress sales cycles, and improve overall win rates. Through its intuitive, premier user experience, Bigtincan Hub delivers real-time content recommendations, ensuring users have the right content to work in any situation and location, on or offline.

 

Bigtincan Hub delivers smarter, next generation sales enablement that will measurably help enterprise sales and service organizations boost productivity and success.

 

  • One Integrated, Intuitive Platform. Everything you need to access, customize, present, collaborate & share content while on a mobile device.
  • Incredible User Experience. Bigtincan® Hub delivers an incredible user experience that ensures rapid user adoption
  • Superior Content Experience. Automatically deliver the right content to the right mobile device users, regardless of where the content resides, directly to their mobile device. Content is organized based on relevance attributes and renders with complete fidelity on any mobile device.
  • Complete Content Security. Bigtincan Hub offers the most comprehensive security on the market that will meet the needs of the most stringent IT security teams.
  • Content Intelligence. Bigtincan’s Content Intelligence system provides visibility & fine-grained measurement of your content’s utilization as well as intelligence for content that is most relevant given a number of attributes such as a mobile user’s role, association, a company’s particular industry or customer type or content that’s best used at a particular stage in a process, time, location & more.
  • Powerful Communications Hub. Extend your communications capabilities. You now have the the ability to send secure messages between individual users or entire groups, real-time video and audio chatting, linking content to social networks, on-the-fly presentation broadcasting to remote meeting participants as well as the ability to subscribe and follow specific Bigtincan hub users and content in the system.

Bigtincan Studio™

 

With Bigtincan Studio™, powered by ScrollMotion®, users can easily create interactive mobile sales presentations that enable their sellers to tell stories and showcase their capabilities in far more compelling ways – leading to more impactful meetings, higher information retention, shortened sales cycles and more revenue.

 

Bigtincan Studio is fully integrated into Bigtincan Hub, enabling creators to share their touch-enabled content with designated users, update materials as needed, and measure usage. Very cool.

 

CREATE THE WOW. CLOSE THE DEAL. REPEAT.

 

  • Bigtincan Studio’s easy-to-use browser based design tool that enables designers, marketers and agencies to build beautiful touch-driven mobile sales apps that present content in a more engaging ways, without having to do any coding.
  • Browser-based easy-to-use design tool that creates interactive mobile sales content without any coding
  • Converts static PowerPoint or PDF presentations into dynamic, interactive touchscreen presentations that increase sales conversion rates
  • Amazing graphical approach demystifies the intricacies of complicated products & easily communicates complex information in ways that will wow the customer
  • Decreases seller prep time & increases face-to-face selling time with customers
  • Dynamic navigation easily adjusts content for the flow of the conversation with customers
  • Ensures that everyone uses the latest approved presentation, controls messaging & mitigates compliance risk.

 

Replace lengthy slide presentations with a single, powerful mobile sale app that delivers high impact content, increases the amount of time customers spend with sellers (on average 3 to 5 times longer per meeting) as well as increases a customer’s retention and recall of key sales messages.

 

Bigtincan hub makes it easy to create and distribute forms to remote workforces on their mobile devices for checklists, order/repair sheets, surveys, inspections, audits, patient monitoring reports, site reviews, trip logs, project reports, quizzes, equipment checks and more. Bigtincan Forms enables users to submit complete, media-rich and error-free forms securely and in real time.

Bigtincan Forms™

 

Bigtincan Forms™ enables organizations to eliminate manual paper-based forms, automate data capture and implement processes improvements without requiring an entirely new infrastructure platform or stand alone forms application.

 

Interactive forms can be easily created and delivered to mobile device users in a matter of minutes, for use both on and offline. Data that’s captured in forms can be easily extracted and leveraged by back office systems to complete workflows and streamline transactions. Bigtincan Forms enables users to submit complete, media-rich and error-free forms, anywhere, from any mobile or desktop device, securely and in real time

 

BETTER MOBILE-FORMS EXPERIENCE

 

  • No separate mobile app required to create, deliver or work with forms
  • Forms work across all mobile operating systems as well as on or offline
  • Forms data is automatically & centrally synced from mobile devices
  • Scan QR/barcodes, perform calculations, capture signatures, attach pictures
  • In-depth data analytics and reporting on forms usage
  • Role-based access controls (get the right forms to only the right users)
  • Complete data security (AES 256 encryption)

 

 

Smarter, More Powerful Sales Enablement Capabilities

  • Prepare. Recommended content and real-time CRM intelligence delivered to any mobile device

 

  • Create. Create custom content, collateral, presentations, and dynamic sales playbooks on the fly

 

  • Engage. Engage your customers and transform the selling experience with more effective, interactive content

 

  • Share. Gain insight into how your customers view, share, and engage with your content via real time usage alerts and dynamic entry into CRM/SFA

 

  • Measure. Measure every content interaction by the team and uncover tribal knowledge within your organization. Understand how people work to help them work better.

Enterprise Random Password Manager

 

Enterprise Random Password ManagerTM (ERPM) is a Proactive Cyber Defense Platform that protects organizations against malicious insiders, advanced persistent threats (APTs) and other sophisticated cyber attacks – on-premises, in the cloud and in hybrid environments.

 

ERPM simplifies the management of your privileged credentials, delivering automated protection at scale, with a rapidly deployed and affordable solution.

 

ERPM continuously discovers and tracks privileged accounts on your cross-platform network, and automatically provides each account with unique and frequently changing credentials. It ensures that powerful privileged identities are only available to audited users on a temporary, delegated basis – preventing unauthorized and anonymous access to systems with sensitive data. ERPM secures privileged identities throughout your IT infrastructure, including:

 

  • Super-user login accounts utilized by individuals to change configuration settings, run programs and perform other IT administrative duties
  • Service accounts that require privileged login IDs and passwords to run, with dependencies across systems in numerous locations
  • Application credentials used by web services, line-of-business applications and custom software to connect to databases, middleware and more
  • SSH Keys that never expire and are widespread throughout your infrastructure
  • Cloud identities on a wide range of platforms including Office 365, Azure Active Directory, Amazon AWS, IBM SoftLayer, Rackspace and Force.com.

 

Enterprise Random Password Manager Delivers:

Proactive Cyber Defense

 

Establishes strong protection for your most critical assets inside the firewall with continuous privileged credential rotation and real-time, automated response to threats

Simplified Compliance

 

Achieves a comprehensive view of risk across privileged accounts for reporting and enforcing credential policies to meet your compliance requirements

Next-Generation Privileged Management

 

Ensures user, administrator, and contractor privileged access remains uncompromised, via automated, continuous privileged credential rotation

Automation at Scale

 

Reduces dependency on manual management of privileged credentials to reduce costs, improve IT responsiveness, and enable orchestration of large, dynamic environments at scale

Architecture

 

Enterprise Random Password Manager™ (ERPM) is an n-tiered, agentless privileged access management solution that secures large and complex enterprise networks. The ERPM architecture consists of:

N-Tier Platform

Platform Support and Enterprise Integrations

High Availability and Disaster Recovery

Scalability and Performance

Ease of Deployment

ERPM DATASHEET

Random Password Manager

 

Random Password ManagerTM (RPM) is a privileged identity management solution that helps protect your organization against cyber attacks that penetrate the network perimeter. It ensures that powerful privileged logins are only available to audited users on a temporary, delegated basis – preventing unauthorized and anonymous access to systems with sensitive data.

 

RPM is a subset of our Enterprise Random Password Manager™ (ERPM) cyber security platform. ERPM includes all the features of RPM, along with the ability to manage service accounts, application credentials and SSH keys.

 

Secure Privileged Access

 

RPM helps you eliminate the shared credentials that attackers exploit to gain lateral access within networks. It generates unique passwords for each privileged account, and then continuously updates the passwords. Even if a hacker obtains a user name and password, the information is of little value because the passwords are constantly changing.

 

As malicious programs and unauthorized users attempt to access your computers and applications, they encounter the unique, frequently changing credentials propagated by RPM. And when new devices are deployed with default passwords that could make your network vulnerable, RPM discovers and secures these credentials.

 

 

Improve IT Efficiency

 

Whenever IT personnel need privileged access for emergency firecall repairs, RPM allows temporary, audited retrieval of current passwords on demand. And by automatically generating new passwords for each administrator and root account, RPM saves your IT staff valuable time that they would otherwise spend doing manual changes. Disclosed credentials are randomized immediately after use, so no one retains long-term knowledge of password secrets.

 

RPM also grants fast, automated access to corporate applications – whether on-premises or in the cloud – without disclosing passwords. Elevated operations performed by users are recorded and audited using RPM’s automatic session recording module.

 

 

Achieve Regulatory Compliance

 

Whenever you must prove compliance with regulatory mandates such as PCI-DSS, Sarbanes-Oxley, HIPAA, FISMA, and others, RPM generates timely, detailed reports. Each time IT staff request privileged access, RPM creates an audit trail showing the requester, target system and account, date and time, and purpose of the request. You get the information you need to ensure that security and compliance goals are met, and gain business intelligence to improve daily IT operations.

 

  • Rapid Deployment — installs on global networks in days instead of months to lower your cost of ownership

 

  • True DiscoverySM — automatically discovers, secures and reports on privileged credentials with the least amount of manual intervention

 

  • Easy Integration — with a few mouse clicks integrates with helpdesk software, SIEM, multi-factor authentication, and more

 

  • Open Platform Architecture — using an industry standard
  • Web services architecture, integrates with Identity and
  • Access Management systems to promote quick adoption and give users missing IAM capabilities through a familiar interface

 

  • Stress-free Maintenance — upgrades are included in the cost of support and are installed quickly by in-house IT staff without the need for professional services

RPM DATASHEET