Phen-icon-1-5

This solution contains proprietary technology providing the ability to detect and manage known vulnerabilities as well as use fuzzing to detect anomalies and penetrate systems with new and unknown flaws. It uses well known suggested settings and configurations from NIST, DISA, and others to ensure systems are configured to be as secure as possible. CanSecure has an extensively written API allowing the integration of our signature vulnerability scanning software with third-party products. The CCG-designed humanoid artificial intelligence is used to perform system administrative duties involving configuration setup and adjustments, fault correction and extending system scanning, penetration testing, Red and Blue Team exercises capabilities of devices.

CanSecure provides auditing that follows various leading standards for compliance (NIST, PCI-DSS, CAESARS) and ensures configuration checks and settings comply to industry standards (NIST, DOD-STIG, SCAP). It uses standard risk assessment scoring (NIST – CVSS) and reporting to help identify and prioritize the resolution of vulnerabilities.

CanSecure is configurable to audit single systems and can scale out to the enterprise and integrate with CheckMate.

Enhancements:

  1. Advancements to the scanner increasing reliability, security and scalability
  2. Auto Management of the scanner including configuration and adjustments of discovered, monitored, and managed devices
  3. Active Device Detection (auto-discovery) implemented for systems and services
  4. Passive Network Scanner investigates communications on the wire and reviews issues, providing expanded analytics
  5. Updated settings & configuration interface easily allows the admin oversight of Phen.AI, the humanoid intelligence and security discoveries within the entire CanSecure product
  6. OS  Security Updates for all products. (OLE 8, Puppet, PostgreSQL, and more)
  7. SLA and NeTERS capabilities (Cloud Analytics and Network IDS) and HIDS integration provide protection of devices which allow a window to the enterprise as a whole
  8. Includes capabilities from both software sets to help secure our system, and provides insight in to network security events
  9. Discovered events can be host-based or network activity-based that identify problems in the enterprise

It provides auditing that follows various leading standards for compliance (NIST, PCI-DSS, CAESARS) and ensures configuration checks and settings comply with industry standards (NIST, DISA-STIG, SCAP). It uses standard risk assessment scoring (NIST CVSS) and reporting to help identify and prioritize the resolution of vulnerabilities..