ACSIA

ACSIA

DKSU4Securitas Ltd
+
+

Related Products

  • Blumira
    146 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website
  • Graylog
    402 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,505 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,231 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website

About

ACSIA it is a ‘post-perimeter’ security tool which complements a traditional perimeter security model. It resides at the Application or Data layer. It monitors and protects the the platforms (physical/ VM/ Cloud/ Container platforms) where the data is stored which are the ultimate target of every attacker. Most companies secure their enterprise to ward off cyber adversaries by using perimeter defenses and blocking known adversary indicators of compromise (IOC). Adversary pre-compromise activities are largely executed outside the enterprise’s field of view, making them more difficult to detect. ACSIA is focused on stopping cyber threats at the pre attack phase. It is a hybrid product incorporating a SIEM (Security Incident and Event Management), Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS), Firewall and much more. - Built for linux environments - Also monitors Windows servers - Kernel Level monitoring - Internal Threat detection

About

Trusted on critical infrastructure globally, Sandfly delivers agentless Linux security with no endpoint agents and no drama. Instant deployment without compromising stability or needing endpoint agents. Sandfly is an agentless, instantly deployable, and safe Linux security monitoring platform. Sandfly protects virtually any Linux system, from modern cloud deployments to decade-old devices, regardless of distribution or CPU architecture. Besides traditional Endpoint Detection and Response (EDR) capabilities, Sandfly also tracks SSH credentials, audits for weak passwords, detects unauthorized changes with drift detection, and allows custom modules to find new and emerging threats. We do all of this with the utmost safety, performance, and compatibility on Linux. And, we do it without loading agents on your endpoints. The widest coverage for Linux on the market. Sandfly protects most distributions and architectures such as AMD, Intel, Arm, MIPS, and POWER CPUs.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Sysadmins, CISO, CTO, SOC Analysts in Fintech, Banking, Regulated Industries such as Pharma, Med Tech

Audience

Linux users requiring a solution to find, isolate and deal with security issues and intruders quickly

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Depends on number of servers
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

DKSU4Securitas Ltd
Founded: 2017
Ireland
4securitas.com

Company Information

Sandfly Security
New Zealand
sandflysecurity.com

Alternatives

Alternatives

SanerNow

SanerNow

SecPod Technologies
ACSIA

ACSIA

DKSU4Securitas Ltd

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Integrations

AWS Hybrid Cloud
Amazon Web Services (AWS)
CentOS
CyberArk Conjur
Debian
Docker
Elasticsearch
Google Cloud Platform
Graylog
HashiCorp Consul
IBM QRadar EDR
Microsoft Azure
Oracle Advanced Security
Podman
Rocky Linux
SUSE Enterprise Storage
Slack
Splunk APM
Ubuntu

Integrations

AWS Hybrid Cloud
Amazon Web Services (AWS)
CentOS
CyberArk Conjur
Debian
Docker
Elasticsearch
Google Cloud Platform
Graylog
HashiCorp Consul
IBM QRadar EDR
Microsoft Azure
Oracle Advanced Security
Podman
Rocky Linux
SUSE Enterprise Storage
Slack
Splunk APM
Ubuntu
Claim ACSIA and update features and information
Claim ACSIA and update features and information
Claim Sandfly Security and update features and information
Claim Sandfly Security and update features and information