CyberCNS follows NIST
-
CyberCNS meets all requirements that are part of the IDENTIFY in the NIST cybersecurity framework
-
Performs Asset Discovery, Vulnerability Management
-
Prevention is better than Cure is an old adage that holds true. It is a proven fact that by following the NIST guidelines you will improve your chances of minimising the impact of cyberattacks, by 99%.
-
Take the first step today and signup
Compliance
-
User Analysis
-
Computer Analysis
-
Active Directory Policies
-
Password Policies
-
User behaviour tracking
-
Integration with Winlogbeat
Lower your Risk by securing your Active Directory
Deep Asset Discovery
-
Windows (WMI, SMB,WinRM)
-
SNMP
-
UPNP
-
ZeroConf
-
SSH
-
AllJoyn (Coming Soon)
Complete Asset Discovery to help mitigate Risks and ShadowIT
Risk Assessment
-
Vulnerability Assessments
-
Missing Patches and upgrades report
-
Application Vulnerabilities
-
Installed Software Report
-
Non Approved Software Report
-
Per Asset and Company Risk Scores
Vulnerability Tracking and Assessing Risk across Assets and groups in an Organization
User Router Assessment
-
Checks end user routers for vulnerabilities
-
Checks if routers have easy to use passwords
-
Checks if the router passwords are hackable
-
Scores the various access points that users connect to from Windows
Track if end users connected to VPN are doing so from a secure network