ACSIA

ACSIA

DKSU4Securitas Ltd
+
+

Related Products

  • Blumira
    131 Ratings
    Visit Website
  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • ManageEngine Log360
    93 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    374 Ratings
    Visit Website
  • Hoxhunt
    4,474 Ratings
    Visit Website
  • Guardz
    56 Ratings
    Visit Website
  • ConnectWise SIEM
    188 Ratings
    Visit Website
  • Criminal IP
    12 Ratings
    Visit Website
  • Resolver
    257 Ratings
    Visit Website
  • ThreatLocker
    469 Ratings
    Visit Website

About

ACSIA it is a ‘post-perimeter’ security tool which complements a traditional perimeter security model. It resides at the Application or Data layer. It monitors and protects the the platforms (physical/ VM/ Cloud/ Container platforms) where the data is stored which are the ultimate target of every attacker. Most companies secure their enterprise to ward off cyber adversaries by using perimeter defenses and blocking known adversary indicators of compromise (IOC). Adversary pre-compromise activities are largely executed outside the enterprise’s field of view, making them more difficult to detect. ACSIA is focused on stopping cyber threats at the pre attack phase. It is a hybrid product incorporating a SIEM (Security Incident and Event Management), Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS), Firewall and much more. - Built for linux environments - Also monitors Windows servers - Kernel Level monitoring - Internal Threat detection

About

Featuring Deep Secure’s unique Threat Removal technology, iX provides 100% guaranteed protection from known and even zero day malware in documents and images. Working on the perimeter, iX acts as a transparent application layer proxy. With support for a wide range of protocols and data formats, it integrates seamlessly into a range of business processes and applications. Documents are intercepted at the boundary and then re-created from scratch, clean and safe on the other side. Nothing travels end-to-end but safe content – 100% guaranteed. Stops malware being infiltrated and prevents covert outbound data loss – for example via image steganography. Deep Secure’s unique content transformation technology intercepts documents at the network boundary and then re-creates them from scratch, clean and safe on the other side. This destroys the threat. Nothing travels end-to-end but safe content.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Sysadmins, CISO, CTO, SOC Analysts in Fintech, Banking, Regulated Industries such as Pharma, Med Tech

Audience

Cybersecurity software for businesses that need a document malware solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Depends on number of servers
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

DKSU4Securitas Ltd
Founded: 2017
Ireland
4securitas.com

Company Information

Deep Secure
Founded: 2009
United Kingdom
www.deep-secure.com/information-exchange-ix.php

Alternatives

Alternatives

Glasswall

Glasswall

Glasswall Solutions

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Integrations

Accellion
Amazon Web Services (AWS)
Boldon James Email Classifier
Slack
Sophos Email
iboss

Integrations

Accellion
Amazon Web Services (AWS)
Boldon James Email Classifier
Slack
Sophos Email
iboss
Claim ACSIA and update features and information
Claim ACSIA and update features and information
Claim Deep Secure and update features and information
Claim Deep Secure and update features and information