What is SecHard?
SecHard is a multi-module software which combines security hardening, asset manager, risk manager, vulnerability manager, performance monitor and much more for delivering complete zero trust architecture.
With SecHard, users are able to implement zero trust architecture and also enable compliance with Executive Office of Presidential memorandum, NIST SP 800-207 and Gartner Adaptive Security Architecture.
Key Features:
1. Security Hardening
SecHard offers automated security hardening auditing, scoring and remediation for clients, network devices, servers, databases, applications and many more.
Using SecHard, users can easily add their own, unique controls and run them on multiple of different assets, allowing audit and automatic remediation for common and non-common technologies (Operating systems, SCADA, IoT, POS, Swift).
This feature lets SecHard to provide industry’s first Security Hardening audit with automated remediation, detailed security scoring, wide device and platform support Remediation with zero risk and optimise ROI.
2. Privileged Access manager (PAM)
SecHard provides PAM that integrates with other PVC areas suggested by the zero trust architecture. With this feature, any computers with hardening or security scores produced by SecHard that do not meet the acceptable security level will not gain authorized access or generated with risk warning.
SecHard is also equipped with traditional PAM features such as password vault that enable access for RDP, VNC, SSH, and Telnet.
Importantly, SecHard can as well integrate with third party PAM product.
3. Asset manager
SecHard offers full automation asset management. The SecHard’s asset manager is based on a module that includes management and reporting of hardware, hardware components (CPU, RAM, disc, etc.), as well as software inventory (operating systems, installed software, running services, etc.).
SecHard gives powerful risk-aware asset management as its Asset Manager module is based on the NIST Cybersecurity Framework and Gartner Adaptive Security Architecture.
This asset manager module also allow users to save risk scores to assets and/or asset groups, generated by the organisation’s information security department.
4. Vulnerability Manager
SecHard applies passive scanning method to run vulnerability detection and management processes for all IT assets without creating any risks.
With its asset manager and device manager modules, SecHard gathers assets and software information, import scores generated by third-party vulnerability scanning tools to include them in the risk management process, while simultaneously send the information being generated to third-party software.
5. Risk Manager
SecHard involves integration of business and technical risk in calculating real-world risk scores.
SecHard also applies its security hardening, vulnerability management and asset management modules as well as integration of business tec to measure and score assets technical security risks.
Additionally, SecHard ensures compliance by meeting security risk scored by information security teams for ISO 27001 ISMS as well as allowing similiar regulations to be added to SecHard’s Asset Management Module.
6. Device Manager
SecHard enables:
- centralized configuration backup and restore operations of network devices.
- manage and monitor all configuration changes on the assets being managed.
- sends configuration changes on multiple devices.
Also, SecHard monitor the number of ports and their status, details of the traffic passing through ports, CPU, and RAM usage for network devices. In a case where critical events arise, SecHard will trigger alarm for notification.
Additionally, SecHard user interface allows user to perform operation tasks like creating a VLAN on network devices only with few clicks and even without CLI commands.
SecHard allows network devices to remediate vulnerabilities previously detected by SecHard, where the requirement is to upgrade their firmware through SecHard interface.
7. Performance Monitor
SecHard offers monitoring services for various types of devices and software with IP addresses (desktops, servers, databases, web services, SMTP services, IP cameras, network printers, routers, switches, etc).
With SecHard integrated architecture for performance monitor, it allows servers and network devices data from VMI, Nod, SNMP exporters to be monitored using a customizable dashboard that show real-time information to monitoring teams.
8. TACACS+ Server
SecHard TACACS+ is equipped with detailed authorization and monitoring beyond authentication with AAA support. With this feature, SecHard can conduct centralized authorisation and authentication for *nix systems and network devices. Furthermore, SecHard TACACS+ modules allows efficient management of every device with a single account while TACACS+ server offers Single Sign On (SSO) facility with Microsoft Active Directory integration.
9. Syslog Server
With SecHard Syslog Server, that supports Secure (TLS) Syslog as well as set the collected event logs store with a time stamp, users can securely collect logs from devices which support sending secure Syslog messages.
Additionally, SecHard allows all Syslog events to be forwarded to third parties such as SIEM, SOAR, log management software in CEF or Syslog format.
Key benefits:
Features |
Benefits |
Security Hardening |
|
Privileged Access Manager |
|
Asset Manager |
|
Vulnerability Manager |
|
Risk Manager |
|
Device Manager |
|
Performance Monitor |
|
TACACS+ Server |
|
Syslog Server |
|