Compliance and Auditing and Management
Prevention goes hand-in-hand with detection and response. Synapsa Auditor provides real-time API based ruleset assessment on assets (e.g. Firewalls) to alert and avoid policy misconfigurations. These policies might be a result of a human error or even of an intended malicious activity. It can detect, alert and disable faulty policies in real time.
Security Policy Automation
Nowadays, Computer networks management is facing real challenges. There has been a rapid increase in number of security devices and tools, organisations opt to migrate to the clouds and Cybersecurity threats happen on daily basis. SecOps Experts manage hundreds of firewalls and making policy changes manually is unacceptable.
Prevention go hand-in-hand with detection and response. That’s where Synapsa Firewall Auditor comes in. It is a tool for real-time ruleset assessment to alert and avoid policies misconfigurations. These policies might be a result of a human error or even of an intended malicious activities. Firewall Auditor can detect and disable a faulty policy in real time.
Firewall Ruleset Enforcement
Administrator changes or creates a new security policy rule on Firewall
Auditor keeps checking the consistency and accuracy of the security policy rules via API
Auditor alerts or immediately and automatically disables faulty security policy rules
Check all integrated, running and connected assets against vendor's or NIST CVE announcements to discover proper vulnerability issues instantly.
Security Rulebase Check
Constantly check security rulebase against pre-defined audit check or user defined rules to disclosure wrongly configured security policies.
Privileges Audit and Management
Real-time assurance that devices have only approved local users with correct privileges to make sure adversary cannot login without being authenticated and reported in identity management system.
Check Integrity of Authentication
Real-time assurance that devices have valid authentication sequence and do not allow authentication against unauthorized or fake identity management system.
Logging Settings Integrity Check
Real-time assessment of logging settings to make sure any activity is properly logged.