logo

Select Sidearea

Area for extra info, links, etc.
[email protected]
+(610) 816-010
 

The ClearArmor Process

The ClearArmor Intelligent CyberSecurity Platform™ (ICSP™) is a data−driven visual model of your entire IT landscape. It continuously updates itself as your network changes. ICSP uses an innovative process to provide you with detailed network and system information like no other product on the market.

 

With the ability to evolve as your network and technology evolves, ClearArmor’s Intelligent Discovery Bots™ (InDiBots™) actively monitor the network, presenting configuration and utilization information about your real and virtualized network and computing devices − including data flows and interactions – down to the subnet and device level. Does your network include SANs, IoT devices, or cloud-based services? ClearArmor’s ICSP can help you see those.

Our ICSP provides centralized access to all statuses, activities, and changes as they occur, giving unparalleled visibility into not only what’s on your network, but also a complete history of how devices and the network are used, by whom, and how changes occur over time.

Cyber Threat Intelligence, Detection, & Alerts

Prioritizing threats and vulnerabilities is a day-to-day struggle. Each day new threats and vulnerabilities give way to network breaches. The most painful of tasks is organizing what to tackle first and how to prioritize those risks. Our platform detects vulnerabilities and threats and will then send an alert.

Malware & Ransomware Detection

Malware can include any type of malicious software – including: ransomware, Trojans, viruses, spyware, and other malicious programs. With phishing on the rise, and more devices and users on the network, companies are at a higher risk of being exposed to malware in one form or another. Malware can disrupt operations, cost thousands of dollars in legal fees and restitution, ruin a brand reputation, and expose private information.

Asset Inventory, Utilization, and Management

You cannot secure what you cannot see. This is where endpoint management comes into play. However, it is difficult to manage endpoints when you have end-user configuration changes, IoT devices constantly popping on and off the network, and you have no way to detect what is on the network on a given time. Our process allows you to manage Cloud/SaaS Applications, Enterprise Mobility Management, Integration Methods & Connectors – through Hardware / Software License Recognition, and Hardware / Software versioning. It will show you everything on your network – including: Hardware makes and models; Software versions, license types and programs, and product use rights; Manufacturer and reseller product codes, SKUs and UNSPC classification data; Physical dimensions, weight, power utilization, and other characteristics; MSRP pricing; Vendor details and much more. They will reveal what assets are in the environment, who manages them, and any security risks.

 

The ClearArmor process supports all UNIX, Linux, Windows, AS400, IBM operating systems and gathers Data for any IP device Providing:

 

  • Full Detailed Hardware and Software Asset Inventory
  • Detailed Hardware and Software Utilization
  • Software Distribution
  • IoT Device management
  • Cloud Management
  • Virtual Machine (including host management) Management
  • Historical Data
  • Change Management Data
  • ITSM CMDB Support
  • Wireless Device support
  • BYOD Management

 

ClearArmor EndPoint Management Processes:

 

  • Intrusion Detection
  • Malware detection
  • Log Analysis / SIEM
  • Vulnerability Scanning
  • White/Black list management

 

Other processes:

 

  • Threat Alerts (Stix and Taxii)
  • Threat Information Sharing
  • System Hardening

Vulnerability Management

Actively scan your entire IT landscape to identify improper system settings, unpatched systems and applications, and non-used system services that are creating unnecessary attack surfaces for your company. Learn whether your systems are vulnerable to attacks others are facing.

Continuous Monitoring

You can’t send a human to a machine fight. The ClearArmor process continuously scans the IT environment and network looking for potential threats and anomalies. It’s a 24/7 watchdog. The ICSP is a cost efficient way to increase network visibility, which not having to add additional resources.

Security Audits and Documentation

ClearArmor allows you to conduct an internal audit as needed and also produces documentation to verify adherence to industry standards. This is done through internal auditing of: software/application risk assessments, standard and corporate compliance, vulnerability audits, password management, and user access levels.

Standards and Policy Compliance

ClearArmor’s ICSP allows you to document your regulatory compliance. Most organizations cannot print out reports or run random audits against regulations proving compliance with many CyberSecurity industry standards such as, NIST, CIS, ISO, etc. To effectively comply with requirements, regulations, and controls – a comprehensive solution must be deployed, which documents measurement against compliance metrics and performs self assessments and random audits. This will allow you to aid in protecting yourself and the organization.

IT-Pedia®

IT-Pedia® is a comprehensive library of information about current and legacy IT products of all types, including hardware, software, mobile devices, and network, telecom and environmental equipment. By taking hardware and software versions it is able to accurately provide IT asset information. It is loaded with hundreds of millions of products. IT-Pedia® contains information about millions of enterprise products, versions, packages, and variations. Each product record contains attributes that are essential during the IT planning, budgeting, purchasing and maintenance phases. These attributes include: Hardware makes and models; Software versions, license types and programs, and product use rights; Manufacturer and reseller product codes, SKUs and UNSPC classification data; Physical dimensions, weight, power utilization, and other characteristics; MSRP pricing; Vendor details; and much more.

Asset Inventory

Many organizations embark on the path of Cybersecurity without attention given to asset discovery. They think that understanding the network is an impossible task, or that it will cause the systems to bog down. In many cases, they resort to manual methods, which are inherently outdated and incomplete. Armed with only this limited view of the network, their approach to CyberSecurity is also inherently incomplete. At ClearArmor, we recognize that an accurate model of the network is key to effective CyberSecurity.

Asset Utilization

Effective Cybersecurity requires understanding not only who and what is on your network, but also how they interact, and how this changes over time. How do endpoints communicate to other endpoints? What applications are responsible for the communications? When do they communicate and who uses what applications to communicate? Regardless of whether a program is used is a standalone application or it is one small part of an n-tier application, if you cannot see the utilization, you cannot effectively protect the network.

Audit and Compliance

Our process, framework, and tools allow you to run audits against industry standards such as NIST, HIPAA, PCI, FERPA, NERC and CIS for compliance checks. Documentation can also be produced on demand to prove compliance.

Automation / Workflows

There are only so many resources that can be dedicated to your security team. Automating processes and updates, and creating workflows minimizes risk by mitigating human error and efficiently deploying processes.

Central Database

All data generated and collected through the real time process is stored within The ClearArmor enterprise Multi-Terabyte SQL database. The database provides immediate real time access to data. The management of the Data leads to full intelligent management of the process. The database process supports federation, structured and unstructured big data type queries and provides a natural language and full SQL type queries.

Change Detection

A historical log of changes is recorded and archived for future use. This allows you to see password change history, file changes, and much more. There changes can let you assess where there is a potential security risk or simply view a history of changes by user.

Cloud Solution

Our solution can be implemented locally, off-site, or in a cloud environment. This allows for convenience and whatever level of security or database administration you should choose.

Intrusion Detection / Prevention / Integration

Through a mixture of technologies, the ClearArmor process can detect anomolies and unapproved devices, applications, and software on your network. It also integrates with existing security tools and services.

Endpoint Management

Endpoint information presents various views into Endpoints that have patching related vulnerabilities at the OS, Driver, or Software level. Endpoints may be viewed or sorted based on Subnet, location, department, division, OS, and a multitude of other variables. Additional views can filter by device type (network, computing devices, applications, etc). In addition to various views and extracts related to Vulnerable Endpoints, the information can be used to present a single Dashboard element as well as part of formulas combine with other data points to rate / rank highest threat exposure based on geographic region, country, location, Division, Department, etc.

 

ClearArmor EndPoint Management Processes:

 

  • Intrusion Detection
  • Malware detection
  • Log Analysis / SIEM
  • Vulnerability Scanning
  • White/Black list management

IoT Device Monitoring

Our process, framework, and tools monitor IoT devices on your network. With the current culture of Bring Your Own Device (BYOD) to work, and the wireless connection of most devices to your network (from printers to cameras), IoT monitoring is imperative to protect your network.

Log Analysis / SIEM

The ClearArmor Process maintains detailed log files of all events in order to determine threats through the discovery of anomalies using real-time data collection, aggregation, and analysis from event and contextual data sources. Our platform also produces compliance reports and examines incidents through multiple levels of data analysis of current / historical and events.

ITSM CMDB

All Configuration Items (CIs) in your CMDB have certain data associated with them. The ClearArmor Process allows you to see what changes were made and by whom. It can search for anomalies and alert when an unauthorized change is requested.

Malware Detection

Malware can include any type of malicious software – including: ransomware, Trojans, viruses, spyware, and other malicious programs. With phishing on the rise, and more devices and users on the network, companies are at a higher risk of being exposed to malware in one form or another. Malware can disrupt operations, cost thousands of dollars in legal fees and restitution, ruin a brand reputation, and expose private information.

Monitoring

You can’t send a human to a machine fight. The ClearArmor process continuously scans the IT environment and network looking for potential threats and anomalies. It’s a 24/7 watchdog. The ICSP is a cost efficient way to increase network visibility, which not having to add additional resources.

Network Utilization

Know accurate bandwidth utilization and how much traffic is on your network. The ability to know ahead of time can help with prevent network downtime due to over congestion. Also determine what connections are idle and troubleshoot issues early on.

Patch Management

The ClearArmor Process deploys automated patch management tools and software update tools for operating system and software/applications on all systems for which such tools are available and safe. Patches should be applied to all systems, even systems that are properly air gapped.

Reporting

ClearArmor allows you to conduct an internal audit as needed and also produces documentation to verify adherence to industry standards. This is done through internal auditing of: software/application risk assessments, standard and corporate compliance, vulnerability audits, password management, and user access levels.

Software Distribution

Automate software deployment and distribution along with any updates. Automated deployments are repeatable, conducted on time to make sure computer images are up to company standard, and leave little room for error. Automation also allows for more frequent deployments and administrators will have more time to work on other projects as manual deployment requires more labor hours.

System Hardening

Proactively harden your system against intrusion. Make sure that system configuration is set correctly, software and firmware are all up to date and patched accordingly, and allow for automation.

Threat Alerts (STIX, TAXII and CybOX)

TAXII, STIX, and CybOX are community-driven technical specifications designed to enable automated information sharing for cybersecurity situational awareness, real-time network defense and sophisticated threat analysis.

Threat Information Sharing

Through information sharing, it is easier to identify, assess, monitor, and respond to cyber threats.

Threat Intelligence

Cyber Threat Intelligence (CTI) processes are built in and can be defined over time. This allows you to proactively defend your network and IT landscape as well as prioritizing events and incident response.

Wireless Detection

Detect what wireless devices are on your network at the speed of now. The ClearArmor process, framework, and tools monitor IoT devices on your network. With the current culture of Bring Your Own Device (BYOD) to work, and the wireless connection of most devices to your network (from printers to cameras), IoT monitoring is imperative to protect your network.

Vulnerability Scanning

Actively scan your entire IT landscape to identify improper system settings, unpatched systems and applications, and non-used system services that are creating unnecessary attack surfaces for your company. Learn whether your systems are vulnerable to attacks others are facing.

Understanding ClearArmor CSRP Technology

CyberSecurity Resource Planning

The ClearArmor CSRP system empowers your organization with a comprehensive, easy-to-understand, cost-controlled, structured approach to CyberSecurity that allows your organization to create and govern a custom CyberSecurity risk management strategy.

ClearArmor Intelligent CyberSecurity Platform (ICSP)

ClearArmor’s ICSP provides a quantum leap forward in CyberSecurity risk mitigation, incident detection, and incident response.

IT-Pedia®: Comprehensive IT Product Data Library

Trying to manage an IT environment without consistent and complete data can be an exercise in futility and frustration.