A NEXT GENERATION NIST / GDPR / ISO / CIS BASED CYBERSECURITY PLATFORM THAT ENABLES TOTAL NETWORK SECURITY MANAGEMENT THROUGH A SINGLE PANE OF GLASSDETECT • MITIGATE • PROTECT
Automated Implementation of Framework and Standards
The ClearArmor Process is Unique
The unique ClearArmor CyberSecurity Process is based upon a defined, structured, and complete approach to Network Security. The key to the process is the real-time automated bot-driven collection and analysis of network and endpoint data. Endpoints include physical and virtual UNIX, Linux, Windows Servers, workstations, printers, routers, switches, IP Phones, IP Devices, cell phones, tablets, and other IT network devices, including IoT.
The process incorporates management and data collection of the following ClearArmor processes. The processes are automated through a ClearArmor process management and automated workflow portal.
All data generated and collected through the real-time process is stored within The ClearArmor enterprise Multi-Terabyte SQL database. The database provides immediate real-time access to data. The management of the Data leads to full intelligent management of the process. The database process supports federation, structured and unstructured big data type queries and provides a natural language and full SQL type queries.
ClearArmor Asset Management Processes – The ClearArmor process supports all UNIX, Linux, Windows, AS400, IBM operating systems and gathers Data for any IP device Providing:
- Full Detailed Hardware and Software Asset Inventory
- Detailed Hardware and Software Utilization
- Software Distribution
- IoT Device management
- Cloud Management
- Virtual Machine (including host management) Management
- Historical Data
- Change Management Data
- ITSM CMDB Support
- Wireless Device support
- BYOD Management
ClearArmor EndPoint Management Processes:
- Intrusion Detection
- Malware detection
- Log Analysis / SIEM
- Vulnerability Scanning
- White/Blacklist management
- Threat Alerts (STIX and TAXII)
- Threat Information Sharing
- System Hardening
The key to any CyberSecurity process is a clear and precise definition of the network. Without a real-time, current, accurate, and precise defined network infrastructure CyberSecurity is impossible. Without a real-time, current, accurate, and precise defined software inventory both NIST and CIS compliance is also impossible.
The ClearArmor network definition process is based upon over 20 years of experience in the world’s largest and most secure networks – including the Department of Defense (SIPRnet and NIPRnet), secure military networks, global financial institutions, industry communication companies, and cable corporations.
The ClearArmor Process defines millions software applications, security patches, individual files, and network hardware – this data coupled with ClearArmor’s encyclopedia of associated product information provides a total visual data-driven definition of the network. The analysis and management of this data permits the ClearArmor process to meet NIST and CIS compliance requirements.
The ClearArmor Process is real-time, automated, fast, and permits full network data and information analysis. CyberSecurity is based on data analysis. The ClearArmor database provides real-time current data and uniquely provides historical data of all endpoint, server, and network changes – including network operations. ClearArmor provides three distinct real-time query engines one of which is a natural language engine. Query results are returned with no delay and in real-time.
NIST and CIS Compliance
The National Institute of Standards and Technology (NIST) and the Center for Internet Security (CIS) have have established a set of individual controls and recommendations that together significantly bring down the probability of an undetected threat. A CyberSecurity process based on the use of independent stove-piped point solutions will not work. The Detection, Mitigation, and Protection against network threats cannot be managed by independent, stand alone solutions. The key to identifying and defeating threats is a solution based upon analysis of the required number of individual solutions that work together to identify threats. The ClearArmor Process meets the recommendations of NIST and CIS.