3.0 |
Supplier: | CyberSafe Corporation |
Platforms: | Win NT: Win 2000: AIX: HP-UX: Solaris: |
Description: |
As traditional Intrusion Detection systems focus on protecting the perimeter, the next generation of security will focus on detecting internal losses involving modifying data, reading data, and executing unauthorized programs. The audit logs and management reports generated can then be used for prosecution support and can prevent the next attack from occurring. In addition, the solution can be outsourced to a managed security provider who can provide 24 by 7 continuous monitoring of your corporate assets. Your business can now reduce your liability from Internal and External misuse and reduce your total cost of ownership. Centrax® security software delivers a fully integrated, security solution with leading technology to protect, detect, and respond to Internet attacks found within your networks, servers, and application levels. Centrax software is tightly integrated with leading file integrity software from Tripwire Security Systems, offering strong protection from misuse and unauthorized attacks from the first line of defense to the actual files -- all managed from a central console. If an attack has been detected, you will be notified immediately to prevent further damage from happening. The Centrax product provides the framework for a highly scalable and powerful solution, yet it is easy to install and use. Centrax software can help your organization create and deploy security policies centrally. In addition, auditing logs and customized reports can be generated for upper management for use in prosecution support.
|
Features: |
|
Certification: | |
Price: | on application |
URL: | www.cybersafe.com |