KnowBe4 is an integrated cloud based platform that provides on-demand, interactive, engaging training, live demos and scenario-based exercises. It is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform used by more than 1,700 organizations to keep employees on their toes with security top of mind. Employees are the weakest link in IT Security and social engineering is the number one security threat to any organization; these end users are usually the lowest hanging fruit for cyber criminals. Realizing that the human element of security was being seriously neglected, KnowBe4 was created by two of the best known names in cybersecurity, Kevin Mitnick (the World’s Most Famous Hacker) and Inc. 500 alum serial security entrepreneur Stu Sjouwerman, to help organizations manage the problem of social engineering tactics through new school security awareness training.
Firewalls - PA 7000 Series
PA 7000 Series next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.
Features and management are consistent across the portfolio. Integration with GlobalProtect™ mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire™ cloud-based malware analysis environment integration supports a rapid “feedback loop” that enables the firewall to stop advanced threats throughout the attack lifecycle.
Monitoring - Shell Control Box
Shell Control Box is a user monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise device, completely independent from clients and servers – integrating seamlessly into existing networks. SCB is a core component of the Contextual Security Intelligence Suite. It captures the activity data necessary for user profiling and enables full user session drill down for forensic investigation. SCB acts as a centralized authentication and access-control point in your IT environment which improves security and reduces user administration costs. The granular access management helps you to control who can access what and when on your servers. SCB perfectly isolates your sensitive systems from unknown intruders or from non-authorized users. In addition, it tracks all authorized access to sensitive data and provides with actionable information in the case of human errors or unusual behavior.
Enterprise Class Log
Management - Syslog-ng
Whether it’s user activity, performance metrics, network traffic, or any other log data, syslog-ng can collect and centralize log data. You can remove data silos and gain full-stack visibility of your IT environment. Depending on its configuration, one syslog-ng server can collect more than 650,000 log message per second from thousands of log sources. With incomplete or compromised log data will you be able to find the root cause of an outage? Spot a cyberattack Pass a compliance audit? See emerging trends in your application? Using local disk buffering, client-side failover and application layer acknowledgement syslog-ng can transfer logs with zero message loss. Encrypted transfer and storage ensure logs cannot be tampered with preserving the digital chain of custody. With powerful filtering, parsing, re-writing and classification options, syslog-ng can transform logs on remote hosts, reducing the amount and complexity of log data forwarded to analytic tools like SIEM or APM, reducing their total cost of ownership. The PatternDB feature can correlate log data in real-time, comparing log message content with predefined patterns. The flexible configuration language allows users to construct powerful, complex log processing systems on remote hosts with simple rules.