Integration - vital to security

Beyond Security has partnered with the following companies to deliver excellence in network and application security testing.

Are you interested in an integration or technology partnership?
Contact us at partners@beyondsecurity.com

 

Amazon Web Services (AWS) provides trusted, cloud-based solutions to help you meet your business needs. The AWS Cloud makes a broad set of services, partners, and support options easily available to help make sure that you can focus on what will make your solution a success.

Link: https://www.beyondsecurity.com/aws.html

RSA Archer GRC modules allow you to build an efficient, collaborative enterprise governance, risk, and compliance (GRC) program across IT, finance, operations, and legal domains. With RSA Archer, you can manage risks, demonstrate compliance, and automate business processes.

RSA Archer GRC and beSECURE, the Automated Vulnerability Detection System, have been integrated to share vulnerability information.

Link: http://www.emc.com/security/rsa-archer.htm

ArcSight Enterprise Security Manager (ESM) is the market-leading security correlation engine used by the most demanding public and private organizations in the world. It protects these firms from external threats such as bots and worms, and internal risks such as fraud and theft.

beSECURE, the Automated Vulnerability Detection System, is integrated with ArcSight ESM to provide vulnerability assessment data.

Link: http://www.arcsight.com/products/products-esm/

The Microsoft Azure Certified program was created to empower Microsoft partners to grow their business through new opportunities to promote and sell their applications and services on Azure. The program will begin as Microsoft Azure Certified for Virtual Machines, with applications from commercial application developers offered as virtual machines that are deployable from the Azure Management Portal. Microsoft will provide comarketing assistance and access to the Azure customer base to help drive application sales for applications that have been Microsoft Azure Certified

Link: https://azure.microsoft.com/en-us/partners/?v=17.28

Service desk software from CA Technologies lets you optimize the business user's support experience. Gain the ability to deliver high-quality, consistent IT service support with Service Desk Manager.

CA Service Desk and beSECURE, the Automated Vulnerability Detection System, have been integrated to share vulnerability information.

Link: http://www.ca.com/us/service-desk-software.aspx

Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.

CORE IMPACT streamlines penetration testing of servers, desktop systems, end-user systems, web applications, wireless networks, network devices, and mobile devices by automating tasks that would traditionally require significant time, effort and expertise to perform. CORE IMPACT automates the accepted best practice for performing penetration tests.

CORE IMPACT depends upon beSECURE, the Automated Vulnerability Detection System, to identify vulnerabilities that it then attempts to exploit.

Link: http://www.coresecurity.com/content/core-impact-overview

F5's Web Application Firewall, Application Security Manager™ (ASM), integrates with beSECURE, the Automated Vulnerability Detection System, so as to provide the most up to date security policy possible. By using beSECURE output, ASM updates its security policy to protect against the vulnerabilities that beSECURE discovered. You can choose which of the vulnerabilities you want the security policy to handle, retest to be sure that the security policy protects against the vulnerabilities, then enforce the security policy when you are ready.

Link: https://f5.com/products/modules/application-security-manager

Imperva is the global leader in data security. With more than 1,300 direct customers and 25,000 cloud customers, Imperva's customers include leading enterprises, government organizations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders.

Link: http://www.imperva.com/index.html

With LogPoint, you have full SIEM and adapted to large enterprises. LogPoint is certified EAL 3+ and specifically addresses the challenges of managing security within your business, whether for EU GDPR compliance, post-incident analysis and visibility into your operations.

Link: https://www.logpoint.com/fr/

Microsoft Security TechCenter provides security bulletins, educational materials and product updates.

beSECURE reports link directly to the applicable Knowledge Base articles providing instant access to the solutions of Microsoft related security issues.

Link: http://technet.microsoft.com/en-us/security/default

The Security Development Lifecycle (SDL) is a software development security assurance process consisting of security practices grouped by seven phases: training, requirements, design, implementation, verification, release, and response. The SDL Pro Network is a group of security consultants, training companies, and tool providers that specialize in application security and have substantial experience and expertise with the methodology and technologies of the SDL.

Beyond Security is a member of the SDL Pro Network and beSTORM is a listed tool.

Link: http://www.microsoft.com/security/sdl/adopt/pronetwork.aspx?section=tools

Pluron, Inc. is a web startup based in Silicon Valley. Our main product is Acunote - an Agile project management tool built on the innovative lightweight Scrum process.

beSECURE, the Automated Vulnerability Detection System delivers Acunote-ready vulnerability report data allowing Scrum managed remediation.

Link: http://www.acunote.com

IBM Security QRadar SIEM can also correlate system vulnerabilities with event and network data, helping to prioritize security incidents.

Qradar is integrated with and depends upon beSECURE to identify network vulnerabilities.

Link: http://www-03.ibm.com/software/products/en/qradar

BMC Remedy is an IT Service Management solution that boasts reduced complexity and seamless integration of customer support, change, asset and request management.

By feeding vulnerability report information directly into Remedy, beSECURE, the Automated Vulnerability Detection System, helps automate remediation planning.

Link: http://www.bmc.com/solutions/itsm/it-service-management.html

Kenna is a software-as-a-service platform that processes external Internet breach and exploit data with an organization's vulnerability scan data to monitor, measure and prioritize vulnerability remediation across their IT environment.

Kenna and beSECURE, the Automated Vulnerability Detection System, have been integrated to share vulnerability information.

Link: https://www.kennasecurity.com/connectors/#vm

By monitoring and analyzing everything from customer clickstreams and transactions to network activity to call records, Splunk turns your machine data into valuable insights. Troubleshoot problems and investigate security incidents in minutes (not hours, or days).

beSECURE, the Automated Vulnerability Detection System, seamlessly feeds scanning data into Splunk for centralized security data management and distribution of graphic vulnerability results to key staff and executives.

Link: http://www.splunk.com/product

Symantec Security Information Manager enables a documented, repeatable process for security threat response and IT policy compliance via integrated log management and incident response solutions.

beSECURE, the Automated Vulnerability Detection System, exports vulnerability incidents to the Security Information Manager allowing coordinated incidence response.

Link: http://www.symantec.com/business/security-information-manager

TOPdesk helps organizations improve their services by offering user-friendly, standardized software. This personal approach has been successful for over 17 years now. Currently, 4,000 organizations in 40 countries use TOPdesk for IT, Facilities, HR and Shared Service Centres. 

beSECURE, the Automated Vulnerability Detection System, delivers vulnerability information to TOPdesk for integration into its incident management workflow. 

Link: http://www.topdesk.com/us/

Trustwave SIEM Operations Edition is event management software for the enterprise - scalable, flexible and easily integrated with the enterprise infrastructure. SIEM OE automatically transforms logs into security events and prioritizes high risk events, providing actionable alerts to help businesses stay secure and compliant.

By feeding it vulnerability test results, beSECURE, the Automated Vulnerability Detection System, enables the log management functionality offered by SIEM OE.

Link: https://www.trustwave.com/siem/siem-operations.php

Request Info