ACSIA

ACSIA

DKSU4Securitas Ltd
+
+

Related Products

  • Blumira
    150 Ratings
    Visit Website
  • ManageEngine Log360
    163 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website
  • Graylog
    411 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website
  • Josys
    204 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website

About

ACSIA it is a ‘post-perimeter’ security tool which complements a traditional perimeter security model. It resides at the Application or Data layer. It monitors and protects the the platforms (physical/ VM/ Cloud/ Container platforms) where the data is stored which are the ultimate target of every attacker. Most companies secure their enterprise to ward off cyber adversaries by using perimeter defenses and blocking known adversary indicators of compromise (IOC). Adversary pre-compromise activities are largely executed outside the enterprise’s field of view, making them more difficult to detect. ACSIA is focused on stopping cyber threats at the pre attack phase. It is a hybrid product incorporating a SIEM (Security Incident and Event Management), Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS), Firewall and much more. - Built for linux environments - Also monitors Windows servers - Kernel Level monitoring - Internal Threat detection

About

As cyber attacks evolve, network security requires unparalleled visibility and intelligence covering all threats for comprehensive protection. And with differing organizational responsibilities and agendas, you need a consistent security enforcement mechanism. These increasing operational demands call for a renewed focus on dedicated Secure IPS to provide a deeper level of security and visibility for the enterprise. With Cisco Secure Firewall Management Center, you can see more contextual data from your network and fine-tune your security. View applications, signs of compromise, host profiles, file trajectory, sandboxing, vulnerability information, and device-level OS visibility. Use these data inputs to optimize security through policy recommendations or Snort customizations. Secure IPS receives new policy rules and signatures every two hours, so your security is always up to date.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Sysadmins, CISO, CTO, SOC Analysts in Fintech, Banking, Regulated Industries such as Pharma, Med Tech

Audience

Enterprises searching for a network security solution to protect their systems against all kinds of cyber attacks

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Depends on number of servers
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

DKSU4Securitas Ltd
Founded: 2017
Ireland
4securitas.com

Company Information

Cisco
Founded: 1984
United States
www.cisco.com/c/en/us/products/security/ngips/index.html

Alternatives

Alternatives

Snort

Snort

Cisco
ACSIA

ACSIA

DKSU4Securitas Ltd
Palo Alto ATP

Palo Alto ATP

Palo Alto

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Integrations

Amazon Web Services (AWS)
Cisco Secure Firewall
Cisco Talos
Google Digital Risk Protection
Microsoft Azure
Slack
VMware Cloud

Integrations

Amazon Web Services (AWS)
Cisco Secure Firewall
Cisco Talos
Google Digital Risk Protection
Microsoft Azure
Slack
VMware Cloud
Claim ACSIA and update features and information
Claim ACSIA and update features and information
Claim Cisco Secure IPS and update features and information
Claim Cisco Secure IPS and update features and information