CheckMate is CCG’s flagship offering. It provides all components needed to combat 19 of the 20 SANS 20 Critical Controls in an affordable packgage. CCG’s CheckMate include the industry leading Cyber Security SME “Phen”.

CCG is leading the evolution of artificial intelligence (AI) in Cyber Security. With the convergence of Big Data, Complex Distributed Systems and the Internet-of-Things… Computer Security is ready for true, strong AI that is able to extract knowledge and understanding from the world of attack and defense of those computer systems.

CCG is delivering solutions derived from the world’s most comprehensive developed intelligence platform called Phen.AI. CCG’s innovative Cyber AI spans global finance, energy, health, devices, social media and more. With the power of Phen.AI, CCG is solving not only today’s most complex cybersecurity problems, but tomorrow’s as well.

EULAEULA

CanSecure

This solution contains patent-pending technology providing the ability to detect and manage known vulnerabilities as well as use fuzzing to detect anomalies and penetrate systems with new and unknown flaws. It uses well known suggested settings and configurations from NIST, DISA, and others to ensure systems are configured to be as secure as possible. CanSecure has an extensively written API allowing the integration of our signature vulnerability scanning software with third-party products. The CCG-designed humanoid artificial intelligence is used to perform system administrative duties involving configuration setup and adjustments, fault correction and extending system scanning, penetration testing, Red and Blue Team exercises capabilities of devices.

It provides auditing that follows various leading standards for compliance (NIST, PCI-DSS, CAESARS) and ensures configuration checks and settings comply with industry standards (NIST, DISA-STIG, SCAP). It uses standard risk assessment scoring (NIST CVSS) and reporting to help identify and prioritize the resolution of vulnerabilities..

KNOW MOREKNOW MORE

NeTERS

This solution provides a higher collection and view of the network’s activities, objects, and evolution, IE: ‘weather patterns.’  Providing system and application data paths throughout the customer’s network. Network traffic detects trends, hotspots, communication patterns, device interactions, importance of areas in the network.

We utilize a lighter level packet inspection vs a traditional IDS, to provide an array of low-cost sensors to enable seeing all activities and actions inside the network. NeTERS works in conjunction with existing IDSs or can provide those capabilities within NeTERS. Packet capture provides malware detection and flow through the network and between hosts, identifies files and watches how they are passed throughout the network, and detects data exfiltration.

NeTERS has the ability to tag, collect, trace and inspect media documents, file documents, web code, and applications in transit, and identifies where various files have moved through the network. NeTERS can also track viruses and virus paths, identifying which systems have been infected. NeTERS can also create network maps in real-time, and has the ability to correctly reconstruct the state of the network at any point in time.

KNOW MOREKNOW MORE

SLA, The SMART LogAnalyzer (SLA)

The SMART LogAnalyzer (SLA) will utilize an analytic and HDFS cloud storage systems for collection and processing of ingested information (EX: Netflow, device logs, alerts). Going to the cloud for storage allows continuous growth of log storage that will enable the software to process new cases in analysis for security purposes. Since cloud storage is built on commodity hardware, and expandable on-demand, it reduces the cost to start and grow your data set.

Since SLA provides a log repository from many different systems, it is able to make correlations between logs that were never before available. Providing full insight into users’ movement through the network and analysis of systems like never before. Since this contains the logs of your entire enterprise, including their weaknesses and attack points, you want to keep this in-house and have full control over the data. You don’t want to unwittingly expose your site by providing the keys to enter. SLA provides the security necessary to guard and protect these key information assets. Our threat analyzer (a component of SLA) provides a mechanism to explore and use business intelligence techniques to ferret out relationships among the data sets to further identify strengths, weaknesses, and vulnerabilities. SLA provides real-time monitoring, signature alerting, personal profiling, and anomalous activity detection, and provides a graphic interface that goes beyond simple graphic indexing with CCG-provided visuals and dashboards.

KNOW MOREKNOW MORE