Centrax Security Software
3.0


Supplier:

CyberSafe Corporation
Platforms:

Win NT: Win 2000: AIX: HP-UX: Solaris:
Description:

As traditional Intrusion Detection systems focus on protecting the perimeter, the next generation of security will focus on detecting internal losses involving modifying data, reading data, and executing unauthorized programs. The audit logs and management reports generated can then be used for prosecution support and can prevent the next attack from occurring. In addition, the solution can be outsourced to a managed security provider who can provide 24 by 7 continuous monitoring of your corporate assets. Your business can now reduce your liability from Internal and External misuse and reduce your total cost of ownership.

Centrax® security software delivers a fully integrated, security solution with leading technology to protect, detect, and respond to Internet attacks found within your networks, servers, and application levels. Centrax software is tightly integrated with leading file integrity software from Tripwire Security Systems, offering strong protection from misuse and unauthorized attacks from the first line of defense to the actual files -- all managed from a central console. If an attack has been detected, you will be notified immediately to prevent further damage from happening.

The Centrax product provides the framework for a highly scalable and powerful solution, yet it is easy to install and use. Centrax software can help your organization create and deploy security policies centrally. In addition, auditing logs and customized reports can be generated for upper management for use in prosecution support.

Features:

  1. Continuous monitoring of your network, server, and applications from internal and external misuse reduces corporate liability
  2. Ease of management and deployment from a centralized console reduces administrative cost savings
  3. Immediate real-time alert notifications via on screen alerts, email, pager or SNMP traps
  4. Automated audit policy generation and enforcement
  5. Automated audit logs and management reporting capabilities for prosecution support
  6. Custom responses and automated graphical reporting
  7. Scales from 1 to 500 target machines
  8. Proprietary scheduling service
  9. Attack anticipation and vulnerability testing; damage assessment (who did what, when);
  10. Host-based, network, and network node intrusion detection integrated with file integrity system from Tripwire
Certification:

Price:

on application
URL:

www.cybersafe.com

 

© Copyright Townsend & Taphouse, 1999-2002. All rights reserved.
Home   Products Section