Keeping your data yours

Similar documents
SWAT PRODUCT BROCHURE

Integrated Threat & Security Management.

Analysis of the Global Vulnerability Management Market Platform Convergence Intensifies Competition but Creates Opportunity in Growth Technology

Managed Service Solutions Catalogue. MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014

G-Cloud Pricing. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

Network Security and Vulnerability Assessment Solutions

PCI-DSS Penetration Testing

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

IT Security & Compliance. On Time. On Budget. On Demand.

PCI DSS Overview and Solutions. Anwar McEntee

PCI DSS Top 10 Reports March 2011

On Demand Penetration Testing Applications Networks Compliance.

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Vulnerability Management

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Extreme Networks Security Analytics G2 Vulnerability Manager

Patch and Vulnerability Management Program

WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

PCI DSS Reporting WHITEPAPER

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Current IBAT Endorsed Services

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

PCI DSS v3.0 Vulnerability & Penetration Testing

EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.

PCI Vulnerability Validation Report

Review: McAfee Vulnerability Manager

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

Continuous Network Monitoring

Preemptive security solutions for healthcare

IBM Security QRadar Vulnerability Manager

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

NE T GENERATION CLOUD SECURITY PLATFORM

HP Application Security Center

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Rozwiązanie SaaS w zakresie bezpieczeństwa teleinformatycznego i ochrony danych dla przedsiębiorstw

The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach

Learning objectives for today s session

Web application security: automated scanning versus manual penetration testing.

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

The Value of Vulnerability Management*

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

THE TOP 4 CONTROLS.

Effective Software Security Management

Overcoming PCI Compliance Challenges

Alcatel-Lucent Services

G-Cloud IV Framework Service Definition Accenture Web Application Security Scanning as a Service

HP Fortify application security

Enterprise Computing Solutions

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Put into test the security of an environment and qualify its resistance to a certain level of attack.

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Cyber Security RFP Template

Wi-Fi, Health Care, and HIPAA

PENETRATION TESTING GUIDE. 1

Application Security in the Software Development Lifecycle

Penetration Testing. Request for Proposal

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Digi Device Cloud: Security You Can Trust

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Application Security Testing Powered by HPE Fortify on Demand. Managed application security testing available on demand

Guided HIPAA Compliance

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

What is Penetration Testing?

Network Test Labs (NTL) Software Testing Services for igaming

Criticial Need for Stronger Network Security. QualysGuard SaaS-based Vulnerability Management for Stronger Security and Verification of Compliance

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Application Backdoor Assessment. Complete securing of your applications

Proactive Vulnerability Management Using Rapid7 NeXpose

Healthcare Security Vulnerabilities. Adam Goslin Chief Operations Officer High Bit Security

Payment Card Industry (PCI) Penetration Testing Standard

QRadar SIEM 6.3 Datasheet

Penetration Testing in Romania

Enterprise-Grade Security from the Cloud

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Transcription:

CORPORATE BROCHURE

Keeping your data yours Outpost24 provides state of the art vulnerability management technology and services that simplify the complex security needs of modern businesses. Since 2001, we have been pioneering customizable tools and solutions that meet the needs for vulnerability management from small companies to large enterprises through scalable, easy to use solutions. We continue to pursue simplicity and usability in all aspects of our development. Today, over 2000 commercial and government clients in more than 40 countries trust Outpost24 to protect their internal and external networks. Outpost24 secures organizations within a wide range of business sectors, including governmental institutions. We offer leading, proactive security solutions in the following areas: Vulnerability Management Outpost24 provides easy to deploy and intuitive solutions to help you continuously identify, remediate and mitigate vulnerabilities on your network. Automated vulnerability scanning is performed on a frequent basis to discover vulnerabilities that are then rated and reported with a recommended remedy. Web Application Scanning Outpost24 offers the most secure, accurate, and advanced web application security option available - SWAT. SWAT brings unparalleled accuracy, a no-touch configuration, and fully managed web application security to all sizes of organizations. SWAT scans thousands of web pages for vulnerabilities and provides a choice between high volume efficient scanning, or unrivalled quality and accuracy for high value applications. PCI Compliance Outpost24 offers a single, user friendly tool based on leading technology to verify and prove the compliance of credit card data handling with PCI Data Security Standard. As an Approved Scanning Vendor (ASV) by the PCI Security Standards Council, Outpost24 assists customers in achieving PCI compliance with perimeter, internal and web application scanning.

Our Products The advanced, proprietary technology of Outpost24 is market leading in vulnerability coverage and scanning accuracy. We transform time consuming and tedious tasks into automated steps that fit into existing organizational processes, thereby reducing cost and time investment for our customers. All of our products can be coupled with implementation and full managed service by our in-house technical experts. Secure Web Application Security (SWAT) SWAT is the most accurate and production safe alternative for security management of high value web applications. This technology offers organizations the benefit of persistence of tools, continuous security monitoring of applications, and an accuracy at the level of experienced penetration testers. The unrivalled accuracy makes SWAT perfect for high value and high availability assets. External Vulnerability Scanner OUTSCAN is an on-demand security tool that enables organizations to assess and manage their external network vulnerabilities. OUTSCAN works from Outpost24 s secure operations center to scan network perimeters, identify vulnerabilities and provide simple reports to identify cost efficient remediation. PCI ASV Compliance Scanner OUTSCAN PCI is an on-demand, SaaS PCI compliance verification tool, based on the OUTSCAN technology, to verify and prove the compliance of credit card data handling with PCI Data Security Standard. As an Approved Scanning Vendor (ASV) by the PCI Security Standards Council, Outpost24 assists customers in achieving and maintaining PCI compliance. Internal Vulnerability Scanner HIAB (hacker-in-a-box) is an automated security solution that enables organizations to assess and manage threats against internal networks. HIAB is installed within the internal network and identifies vulnerabilities on servers, workstations and other devices. With HIAB, scanning, reporting and data analysis is performed within the appliance, ensuring that data never leaves your internal network. HIAB on-demand products HIAB PORTABLE is an on-demand security scanning solution enabling professionals to assess and manage internal vulnerabilities on the go or on an ad hoc basis. HIAB Portable excels in customizable reporting and screening of non-managed and non-connected networks as well as penetration tests. HIAB SMALL BUSINESS is an on-demand security scanning tool for small organizations to diagnose their internal network vulnerabilities and to protect sensitive data. HIAB Small Business offers efficient vulnerability management to identify network exposures, detect vulnerabilities and to automate reports, for easy problem solving on internal networks.

Our Services Outpost24 offers professional services to organizations looking for an added element of human intelligence to their security program. Our ethical, technical experts professional hackers hold certifications such as Certified Ethical Hacker and CISSP and conduct detailed tests for technical and logical security errors according to OWASP guidelines. They then evaluate and document possible points of attack on your networks or applications and explore points of weakness as a cybercriminal would. We offer the following areas of professional services: Network & Infrastructure Assessments Internal & External Audits Wireless Network Audits IPv4 & IPv6 Our Customers Web Application Testing Authenticated Unauthenticated Stress & DoS Testing Applets REST HTML5 Mobile Application Testing ios Android Windows Mobile Outpost24 s proactive security solutions have helped over 2,000 companies avoid exploitation of their corporate networks. Our customers range from small local businesses to multinational organizations, and span a wide range of sectors including transport, finance, education, government, healthcare, retail, wine & beverage, space industries and multimedia.

The Outpost24 Advantage Security-focused Development Outpost24 s products and services are inherently secure; our technology is developed in the context of security needs and not driven solely by compliance directives. Direct Customer Support Our 24x7 direct support at no additional cost ensures that all customers get the technical support they need, on-demand, by qualified technology experts. Management-minded Reporting We help you bridge technical vulnerability management details and business interests by offering reports and overviews that demonstrate the success and impact of vulnerability management efforts over time. High Accuracy Our innovative scanning tools are continuously improved to be the most accurate scanners on the market; Outpost24 maintains a uniquely low average of false positives. Unlimited Scalability Outpost24 tools fit internal and external networks of all sizes and can integrate with different appliances to increase scalability and span vast networks. Virtualization Outpost24 supports all major virtualization platforms, resulting in simple, swift and seamless deployment, distribution and management of HIABs. Innovation Outpost24 foresees market and organizational demands in the context of security needs and continually develops features to help our customers proactively protect their assets. Our People We believe that our customer relationships are best handled by local partners; Outpost24 understands the unique differences between markets and employs expert international sales and technical support teams that are present throughout the world.

ABOUT OUTPOST24 Outpost24 offers vulnerability management tools and solutions ranging from fully automated to full-service and secures more than 2,000 corporate and government organizations worldwide. Spanning most industries and business sectors, Outpost24 customers include: Travelex, Delta Lloyd Group, ING Life Limited, Banco Multiva, Technologies de l Information de l Etat (CTIE), Funda, Vebego, Generali, Arcelor Mittal, Grupo Salinas and Deutsche Postbank. Outpost24 is headquartered in Sweden and serviced by a global network of local sales offices. Outpost24 Headquarters Bastionsgatan 6A 371 32 Karlskrona Sweden +46 455 612300 www.outpost24.com