Simple, effective and affordable software as a service solution for monitoring, auditing and mitigating risk of IT resources

Free trial

Monitoring

Event Analyser

Forensic Analysis

Analytics

Vulnerability Assessment

Reporting

Monitoring

Agent-based Nodes monitoring.
Hosts (nodes with agents installed) & services running on them.

  • Host Status.
  • Service Status.
  • Email Notifications.

Infusion Host monitoring provides operational awareness of the basic infrastructure elements and their services along with early warning in case of downtime or other critical status level.

Event analyser

Surveillance and data gathering for events on all aspects of systems (hosts) activity including file integrity monitoring, log monitoring, rootcheck, and process monitoring.

  • Log analysis.
  • File integrity.
  • Windows registry monitoring.
  • Rootkit detection.
  • Support and protection on multiple operating systems.

Infusion event analyzer is built on open components (i.e. OSSEC toolkit) gathering relative operational data and triggers rule based alerts enabling active response where needed.

Forensic Analysis

Real time or historical snapshots of the hosts with detailed analysis on processes and events.

  • Process profiling.
  • Open connections
  • Open file handles
  • Used DLLs per process

Infusion forensic analysis instigates the ability to facts concerning events and their impact in operational capability (by combining system logs and process details ).

Analytics

Nodes profiling and performance management.

  • System Profiling.
  • Processes analysis.
  • Performance Visualization.

Infusion Analytics combines details about the status of the infrastructure with a data fusion overview approach through the Black Hat scoring scale (black hat = hacker) for each node hosting an agent. The lowest the score for a node (host) the better. Details concerning each node’s assets and operation are broken down and visualized accordingly through intuitive UI.

Vulnerabilities assessment

Detection of common cybersecurity vulnerabilities.
Agent-based assessment built around specific operational requirements and policies along with publicly known and reported vulnerability issues (i.e. CVE® lists).

  • Operating System level vulnerabilities.
  • Services Level Vulnerabilities (http, smtp, etc.).
  • Report Generation.

Infusion Vulnerability Assessment provides the administrator with essential information on the Nodes (agent hosts) status enabling them to get insight, impact assessment and proposed solutions about soft points in their infrastructure.

Reporting

Schedule reports based on custom filters. Reports can be used for auditing and compliance. (E.g. report the number of failed administrator logins per system , per week)

Monitoring
Monitoring
Event Analyser
Forensinc
analytics
Vulnarability assessment
Vulnarability assessment
Inventory
Application Printscreen

Monitoring

Agent-based Node monitoring.
Hosts (nodes with agents installed) & services running on them.

  • Host Status.
  • Service Status.
  • Alerts (email & Slack).

Infusion Host monitoring provides operational awareness of the basic infrastructure elements and their services along with early warning in case of downtime or other critical status level.

Application Printscreen

Event analyser

Surveillance and data gathering for events on all aspects of systems (hosts) activity including file integrity monitoring, log monitoring, rootcheck, and process monitoring.

  • Log analysis.
  • File integrity.
  • Windows registry monitoring.
  • Rootkit detection.
  • Support and protection on multiple operating systems.

Infusion event analyzer is built on open components (i.e. OSSEC toolkit) gathering relative operational data and triggers rule based alerts enabling active response where needed.

Application Printscreen

Forensic Analysis

Real time or historical snapshots of the hosts with detailed analysis on processes and events.

  • Process profiling.
  • Open connections.
  • Open file handles.
  • Used DLLs per process.

Infusion forensic analysis instigates the ability to facts concerning events and their impact in operational capability (by combining system logs and process details).

Application Printscreen

Analytics

Nodes profiling and performance management.

  • System Profiling.
  • Processes analysis.
  • Performance Visualization.

Infusion Analytics combines details about the status of the infrastructure with a data fusion overview approach through the Black Hat scoring scale (black hat = hacker) for each node hosting an agent. The lowest the score for a node (host) the better. Details concerning each node’s assets and operation are broken down and visualized accordingly through intuitive UI.

Application Printscreen

Vulnerabilities assessment

Detection of common cybersecurity vulnerabilities.
Agent-based assessment built around specific operational requirements and policies along with publicly known and reported vulnerability issues (i.e. CVE® lists).

  • Operating System level vulnerabilities.
  • Services Level Vulnerabilities (http, smtp, etc.).
  • Report Generation.

Infusion Vulnerability Assessment provides the administrator with essential information on the Nodes (agent hosts) status enabling them to get insight, impact assessment and proposed solutions about soft points in their infrastructure.

Application Printscreen

Reporting

Schedule reports based on custom filters. Reports can be used for auditing and compliance. (E.g. report the number of failed administrator logins per system , per week)

MON STARTER
 

  • 10 Agents pack
  • 2GB / Agent Cloud storage

70€ / MON

Contact us

MON BUSINESS
 

  • 20 Agents pack
  • 2GB / Agent Cloud storage

120€ / MON

Contact us

FORENSICS
 

  • Max 20 agents
  • 200GB Dedicated storage

200€ / MON

Contact us

14Day FREE TRIAL

  • 5 Agents
  • 2GB / Agent

Free trial

The Stack:

Infusion Agents are installed on monitored hosts and collect operational data. The Infusion Manager collects and analyzes data transforming them to exploitable information.The Infusion Manager can also initiate inbound port scanning and vulnerability assessment of monitored infrastructure. The Web User Interface visualizes the information and enables management and mitigation of risk for the monitored infrastructure


Download the Datasheet

The business need

Digital transformation is turning IT Operations into the most significant element of daily business activities. Corporate assets are also transforming due to the continuous abstraction and convergence of ICT resources. Cloud and mobility have multiplied operational challenges while creating at the same time new business opportunities.Digital business and its operations generate new, diverse, cyber security challenges in terms of everyday productive engagements but also in terms of compatibility with regulation, compliance and financial governance. As online transactions and data are growing exponentially, cyber threats are the norm, not the extraordinary. IT security is now an integral part of business operations and a critical element of corporate activity.

Features

Events Management with flexible filtering capabilities

Real time operational monitoring of IT resources & Network

Historical data for IT forensic analysis

Port scanning & vulnerability assessment

Adaptable reporting

Intuitive UI engineered to support different types of users

Tool for compliance alignment

Cloud Native Application with local deployment option



Video Tutorial:

Security Infusion is a valuable tool, developed using ITML's expertise of managing IT resources and operational risk. With its effective, simple, and feasible attributes, Security Infusion can be used anytime and anywhere.