SECURITY & CYBER DEFENSE MANAGEMENT
Adept Secure ® software sets the new standard in providing never before seen levels of Security Asset Management for NERC CIP standards.
Secures and Monitors based on Seven Layers of Open Systems Interconnection ( OSI ).
ADEPT SECURE ® SAFEGUARDS THE KEY INTRUSION POINTS TARGETED FOR CYBER AND END POINT INFILTRATION:
NERC - Critical Infrastructure Protection (CIP)
The US power industry is the target of unprecedented amount of cyber terror risks and threats.
Hacking, cracking, kill chains, zero-day attacks, ransomware, alert fatigue and other attacks have reached levels of sophistication surpassing the capabilities of most organizations to defend against.
On December 23, 2015, Ukrainian power companies experienced unscheduled power outages impacting a large number of customers in the Ukraine. In addition, there have also been reports of malware found in Ukrainian companies in a variety of critical infrastructure sectors.
Public reports indicate that the Black Energy (BE) malware was discovered on the companies’ computer networks, however it is important to note that the role of BE in this event remains unknown pending further technical analysis.
• Cyber Security - ADEPT SECURE ® software sets the new standard in providing never before seen levels of protecting the data and integrity of computing assets belonging to or connecting to an organization’s network. Its purpose is to defend those assets against all threat actors throughout the entire life cycle of any cyber attack.
FEATURES AND ADVANTAGES
• Port Scanner - Automated Port scanner through the Enterprise. Alerts of any Port traffic, or configuration changes that are NOT Allowed.
• MAC to IP Hardware Tracker - Manage all Mac Addresses within your enterprise. Know what devices are inside you network at all times. Prevent unknown Mac devices from having access. If a hacker gains unauthorized access you will know based on being alerted of this activity.
• External - Internal Network Traffic Management - See all outgoing and incoming traffic within your organization. Kill, Prevent any Process that you don't want running on any device within your network. Kill any process that is not authorized.
• Firewalls/Router/Switch Management - Keep an eye on all Routers, Switches and other network devices that manage your network. Be Alerted if any of them have been accessed or changed.
• Attack - Attack the attacker. Save your attack information in an easy digital and paper reports that can be sent to your management and to law enforcement.
• Defense - Saves all attack information for your organization in a relational database and defense processes are created and managed to automatically protect your organization.
• Protects – Networks, Computers, and data from unauthorized access.
• Improves – Information security and business continuity management.
• Customizable – Customized to best fit your corporation's processes.
• Access Anywhere - Provides real-time access to remote systems.
• GIS and GPS Ready - Easily leverage your existing GIS and GPS systems.
• FAST- Scanning of all devices and ports.
• Scalable – Handles your corporation's cyber asset growth.
Contact Adept Technologies
For more information