Simple, effective and affordable software as a service solution for monitoring, auditing and mitigating risk of IT resources
Free trialAgent-based Node monitoring.
Hosts (nodes with agents installed) & services running on them.
Infusion Host monitoring provides operational awareness of the basic infrastructure elements and their services along with early warning in case of downtime or other critical status level.
Surveillance and data gathering for events on all aspects of systems (hosts) activity including file integrity monitoring, log monitoring, rootcheck, and process monitoring.
Infusion event analyzer is built on open components (i.e. OSSEC toolkit) gathering relative operational data and triggers rule based alerts enabling active response where needed.
Real time or historical snapshots of the hosts with detailed analysis on processes and events.
Infusion forensic analysis instigates the ability to facts concerning events and their impact in operational capability (by combining system logs and process details).
Nodes profiling and performance management.
Infusion Analytics combines details about the status of the infrastructure with a data fusion overview approach through the Black Hat scoring scale (black hat = hacker) for each node hosting an agent. The lowest the score for a node (host) the better. Details concerning each node’s assets and operation are broken down and visualized accordingly through intuitive UI.
Detection of common cybersecurity vulnerabilities.
Agent-based assessment built around specific operational requirements and policies along with publicly known and reported vulnerability issues (i.e. CVE® lists).
Infusion Vulnerability Assessment provides the administrator with essential information on the Nodes (agent hosts) status enabling them to get insight, impact assessment and proposed solutions about soft points in their infrastructure.
Schedule reports based on custom filters. Reports can be used for auditing and compliance. (E.g. report the number of failed administrator logins per system , per week)
Infusion Agents are installed on monitored hosts and collect operational data. The Infusion Manager collects and analyzes data transforming them to exploitable information.The Infusion Manager can also initiate inbound port scanning and vulnerability assessment of monitored infrastructure. The Web User Interface visualizes the information and enables management and mitigation of risk for the monitored infrastructure
Digital transformation is turning IT Operations into the most significant element of daily business activities. Corporate assets are also transforming due to the continuous abstraction and convergence of ICT resources. Cloud and mobility have multiplied operational challenges while creating at the same time new business opportunities.Digital business and its operations generate new, diverse, cyber security challenges in terms of everyday productive engagements but also in terms of compatibility with regulation, compliance and financial governance. As online transactions and data are growing exponentially, cyber threats are the norm, not the extraordinary. IT security is now an integral part of business operations and a critical element of corporate activity.
Events Management with flexible filtering capabilities
Real time operational monitoring of IT resources & Network
Historical data for IT forensic analysis
Port scanning & vulnerability assessment
Adaptable reporting
Intuitive UI engineered to support different types of users
Tool for compliance alignment
Cloud Native Application with local deployment option
Security Infusion is a valuable tool, developed using ITML's expertise of managing IT resources and operational risk. With its effective, simple, and feasible attributes, Security Infusion can be used anytime and anywhere.