Providing Security from the Inside-Out: Providing Security within the Trusted Network Itself

Most security products possess the primary purpose of providing security for an organization from the “outside-in.” Topping the list are firewall companies such as Checkpoint, Palo Alto Networks, and the Cisco PIX/ASA product-line.

All of these firewall products provide some level of stateful packet inspection (SPI) primarily for untrusted “outside traffic” entering into an organization’s trusted network. While these products certainly do more than this, their historic and current core operation is still SPI for traffic originating from outside an organization entering into the internal “trusted” portion of a given organization’s network.

CCG’s entire product line is positioned to provide both “inside-out” and “outside-in” security. When you examine each of the CCG’s products, you will see how each product provides security measures both “inside” an organization’s network as well as for potentially malicious traffic originating from “outside” the network.

See below to learn more about CCG’s Software suite:

http://www.cancgroup.com/software.php

Learn how:

  • Cognoscenti periodically scans systems to see what has changed from a baseline configuration and operational status.
  • NeTERS constantly monitors traffic patterns using tools such as NetFlow and NTOP to see what has changed from a network traffic pattern perspective.
  • CanSecure proactively scans devices, particularily servers, using tools such as OpenVAS for on-demand penetration testing.
  • Smart Log Analyzer (SLA) logs and collates data for a range of correlations and sophisticated threat analysis.

AND THEN THERE IS PHEN: The Intelligent Security Agent that uses all of these CCG tools as well as other vendors’ security tools!

Phen is the absolute centerpiece of the entire CCG product line!

Phen provides true artificial intelligence where other security tools provide machine learning only.