Products & services for intellectual property protection

The highly scalable products and services for the protection of intellectual property interlock seamlessly. The realization of the implementation extends to on-premise, IoT and cloud, as well as hybrid solutions from these infrastructures.

Compliance to Code (C2C)

Monitoring the infrastructure and maintaining availability

Compliance to Code – Key Features:

  • On-Premises and IoT agentless monitoring
  • Monitoring for hundreds of remote networks, and / or just the local network
  • Monitor Windows, Linux, Unix and network devices
  • Ping, CPU, memory, disk, SNMP + traps, Event Logs, services, etc.
  • No scripts or configuration files required
  • Web based reports and a native Windows GUI application

Enterprise Integrity Management (EIM)

Data integrity protection

Key Features:

  • Agend-based and agentless monitoring for On-Premises and IoT environments
  • Real-time file and folder monitoring for access, manipulation and/or permission changes
  • Audit File Access
  • Ransomware Protection
  • Clearly structured, strait forward and simple policy definition for detection, notification and alerting
  • Web based reports and a native Windows GUI application

Data Leakage Prevention (DLP)

Protection of confidentiality

Key Features:

  • Agent-based and agentless monitoring for On-Premises and IoT environments
  • Centralized Management for Data Leakage Prevention und Data Leakage Protection
  • Automatically block access for specific accounts
  • Audit File Access
  • Web based reports and a native Windows GUI application

Next-Generation SOC

Your requirements determine how your SOC – Security Operation Center is put together, configured and parameterised. Our integrations can be combined modularly for a Next-Generation SOC, but also optionally in such a way that they interact with the existing solutions of other manufacturers.

You are also free to decide what your Next-Generation SOC looks like.