Cyber Security by Senstar
Rubidium uses a combination of a Network Management System (NMS) and cyber-security awareness and monitoring service that can handle all sources.
The system is able to automate status collections from multiple sources and offer a wide visibility view of both operational and security statuses.
The system utilizes a user friendly single console interface to view ‘who, what and where’ in terms of security events.
Event processing is then used to perform correlation analysis across the network. It is also configured to increase accuracy and reduce false positives.
Rubidium Cyber Security Features and Benefits
The Rubidium system has multiple connections to Senstar and other third parry equipment. It lets you monitor analyze and alert any suspicious network activity. It integrates with PSIM and vulnerability scanning tools and can provide help in correcting poor security configurations.
Integrated endpoint and network security
Rubidium is integrated with a number of endpoint security products that work on desktops and servers, including disk encryption, media encryption, anti-malware and firewalls. Also integrated with the system is a VPN, IDS, IPS and anti-virus software. All security tools report back to the Rubidium central interface for event monitoring and alerting.
Online Report Views
Security threats and faults can be reported in real time. The monitoring system works as a workflow and fits in with a variety of security compliance and regulation expectations.
Tungsten Cyber Security Ethernet Switch reports any security events and threats across the local area network to Rubidium for viewing and alerting.
If a cybercriminal attempts to bypass the perimeter using a wireless connection, this will be detected and illegal wireless activity will be alerted to Rubidium users.
Data Access Control
Rubidium will monitor, detect and alert you to any untoward information or physical access attempt. As cybercriminals increase their attacks against business users and the attacks become ever more sophisticated, monitoring and analysis have become vital tools in the fight against cyber-crime.