The crude reality of IT security operations is characterized by lots of layers, services and silos to handle. To overcome this and getting a complete overview and correlation between events there is a need for a centralized solution that can interact with all aspects of the company’s data, assets and networks. Centry™ is developed from known open source systems and can interact with every API, (Application Programming Interface), and log services your company can provide. At the back end all the data is encrypted and processed by algorithms, security rule sets and of course our own security operations team. The result is that your company gets notified as soon as an intrusion is attempted, infection found, or data is breached. We aim to stay in front of events instead of just running around firefighting.
- Network traffic monitoring. Hardware or software sensor listening on internal and external traffic
- Endpoint assessment. Endpoint that asses all inventory on the computer
- Risk scoring. Endpoint scoring of software versions and patch status
- Vulnerability detection. Up to date feed of vulnerabilities present on endpoints
- Live attack feed. Get access to your own security portal with live attack feeds
- Cyber Security Specialists. Your own dedicated team of experts analyzing your company