|
Virtustream Security Solutions Analytics and Continuous monitoring Engine (ACE) platform is available as a turnkey appliance based solution. ACE|Block allows enterprises to build best proactive defenses against Cyber Threats using a fully configured, performance optimized and security hardened solution.
ACE|Block provides a scalable solution that implements SQL or NoSQL backend for data ingest, store and processing. ACE|Block provides:
- Virtustream Security Solutions Reference Architecture for Cyber Security
- For NoSQL backend, completely configured Hadoop ‘Eco-System’, including Hive, HBase, Map/Reduce framework, ZooKeeper and others
- ComplyVision™ technology providing the business logic for Regulatory Compliance and Information Assurance (IA) Controls frameworks
- ACE collector and sensor connectors for data ingest. Supports ingest of gigabytes to petabytes of data
- ACE Analytics and Dashboard with native connectors to Hadoop
- Performance optimized and security hardened configuration of servers, networks and applications
ACE|Block solution for Cyber Security provides a Continuous Risk and Compliance monitoring capability that provides:
- Proactive Risk Management using Standards based Framework
- Continuous Monitoring of each asset for Compliance and Risk by building a 360 degree view of each asset within the enterprise
- Continuous monitoring requires ability to process massive volumes of variety of data quickly (Volume, Variety and Velocity). The data could be structured or unstructured.
- Perform deep automated and manual analysis based on threat and impact analysis
- Building and utilizing knowledgebase for continuous refinement of data analytics
- Enabling near automated mitigation by interfacing with other tools and technologies
ACE provides the turnkey solution that is highly scalable and secure. ACE is also available as software only solution.
ACE solution has been deployed in most secure defense establishments as well as Fortune 500 commercial enterprises.
For additional details on how to deploy the best proactive defenses against Cyber Threats, please contact us.
|