Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Identify files deemed harmful based on particular signatures identified by researchers, publishers, and our Cyber Threat Intelligence (CTI) team. Implement detection alerts for Indicators of Compromise (IOCs) linked to known threats and supplement them with your own IOCs to customize the Endpoint Detection and Response (EDR) system for your specific environment. Our research and development team is consistently refining its algorithms to empower you to identify binaries that are commonly thought to be undetectable. Utilize over 1,200 detection rules to uncover potential new threats that may not be included in existing IOCs or signature databases. A specialized engine has been created to combat ransomware effectively. It also protects your EDR system from unauthorized modifications, ensuring it continues to function properly. Additionally, it prevents the download and installation of harmful or outdated drivers using our regularly updated list. Should any malicious driver attempt to alter your EDR's monitoring and protective capabilities, you will receive immediate alerts to address the issue. This proactive approach ensures a robust defense against evolving cyber threats.

Description

iSecurity Safe-Update safeguards vital IBM i business data from unauthorized modifications made by programs that originate from libraries not designated for production use, including file editors, DFU, and Start SQL (STRSQL). This solution ensures that only previously authorized applications or those not recognized as file editors can perform updates. Compliance with various regulations such as Sarbanes-Oxley (SOX), GDPR, PCI, and HIPAA mandates that organizations implement strict controls to protect data integrity and oversee who is allowed to make updates to their critical production data. These regulations emphasize the necessity for only explicitly approved programs to alter business-critical information in active environments. By preventing unauthorized updates from potentially harmful applications that do not adhere to the organization's established business protocols, Safe-Update reinforces data security. In the event of an attempted unauthorized update, a prompt appears requesting a ticket number to proceed, thereby adding an extra layer of security to the process. This proactive approach not only enhances data protection but also helps companies maintain compliance with essential regulatory requirements.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Filigran
Google Cloud Platform
Microsoft Azure
Mindflow
OVHcloud
OverSOC
Scaleway

Integrations

Amazon Web Services (AWS)
Filigran
Google Cloud Platform
Microsoft Azure
Mindflow
OVHcloud
OverSOC
Scaleway

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

HarfangLab

Founded

2018

Country

France

Website

harfanglab.io/en/

Vendor Details

Company Name

Raz-Lee Security

Founded

1983

Country

United States

Website

www.razlee.com/safe-update/

Product Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Product Features

Alternatives

Alternatives

iSecurity AP-Journal Reviews

iSecurity AP-Journal

Raz-Lee Security
iTransact Reviews

iTransact

Payroc