CCG Selected for the Northrup Grumman Cohort Program

Canfield CyberDefense Group (CCG) has been selected from 18 applicants by Northrup Grumman for CCG’s innovative cybersecurity software products, and for CCG’s proven track record helping large companies, small businesses, and individual device users with Phen, CCG’s patented AI that detects security breaches within 15 minutes. The industry products and services in place today can […]

Read More »

Cognoscenti – The Security Configuration Time Machine

Cognoscenti provides Continuous Configuration Management and a unique “Time Machine” look and feel to configuration management. Cognoscenti drives the required analytics and data needed to quickly achieve NIST-800-171 compliance. This enables our customers to obtain detailed configuration settings and changes. The discussion below addresses section 3.4 of the NIST standards. Cognoscenti, in addition to CCG’s entire […]

Read More »

Your Phone becomes a Security Monitoring Station

Enlists the power and security of CCG software data at your fingertips, anytime, anywhere. The data and understanding of your environment is great. But it’s essential to obtain a full understanding when you are not at work. During an alert or heightened event, getting detailed, accurate information is critical. CCG provides protection of all portable […]

Read More »

Canfield CyberDefense Group LLC Receives 2017 Best of Olney Award

FOR IMMEDIATE RELEASE Olney Award Program Honors Achievement OLNEY May 2, 2017 – Canfield CyberDefense Group LLC has been selected for the 2017 Best of Olney Award in the CyberSecurity Services category by the Olney Award Program. Each year, the Olney Award Program identifies companies that have achieved exceptional marketing success in their local community […]

Read More »

Humanistic Intellect allowing Phen to manage security compliance.

Phen has been integrated and educated on security application monitoring. Phen makes running system scans more efficient and reduces “run away” security processing. Phen has a variety of methods both taught and learned. This self-gained knowledge is used to make the system security processing more efficient, avoid extensive, unnecessary network noise, and minimize the effects on a system’s […]

Read More »

Providing Security from the Inside-Out: Providing Security within the Trusted Network Itself

Most security products possess the primary purpose of providing security for an organization from the “outside-in.” Topping the list are firewall companies such as Checkpoint, Palo Alto Networks, and the Cisco PIX/ASA product-line. All of these firewall products provide some level of stateful packet inspection (SPI) primarily for untrusted “outside traffic” entering into an organization’s […]

Read More »

Top