ARAMA TECH SOLUTIONS

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 35 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.

Symantec provides tools to help uncover cyber threats across endpoints, email, and network by leveraging one of the most comprehensive sources of security intelligence in the world. The Symantec™ Global Intelligence Network is made up of more than 57.6 million attack sensors; monitors threat activity in over 157 countries and territories; and records thousands of events per second.

HP is a leading provider of security and compliance solutions for the modern organization that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from Atalla, TippingPoint, ArcSight and Fortify, HP Security delivers advanced correlation, application protection, and network defense technology to protect today’s applications and IT infrastructures from sophisticated cyber threats.

Technology Partnerships and products to support the ARAMA TECH proposition are carefully choosen, each being a leader in their respective area and each product with its’ unique use case and position, but all fully capable of integrating with each other, thus providing the best ROI to organizations. We understand the challenges of the business and we understand the complexity of IT. It is our mission to solve business challenges and convert products into business solutions!

PRODUCTS

IBM RESILIENT

Respond to incidents faster, more efficiently, and more intelligently with the IBM Resilient Incident Response Platform Enterprise

IBM Resilient’s mission is to help organizations thrive in the face of cyberattacks and business crises. IBM Resilient helped create the market more than five years ago by building the industry-leading Incident Response Platform.

By using the Resilient Incident Response Platform, security teams can create a central hub for response that orchestrates the full response process dynamically, enabling faster, more intelligent response and mitigation. The Resilient Incident Response Platform (IRP) is one of the industry’s only platforms that enables complete incident response orchestration across people, process, and technology.

  • People: The Resilient IRP enables cross-organization collaboration between the SOC, HR, IT ops, and executives.
  • Process: The Resilient IRP provides Dynamic Playbooks that are built on NIST/CERT/SANS standards, yet easy to customize with organizational SOPs.
  • Technology: The Resilient Incident Response Platform’s open and agnostic platform integrates with your security infrastructure and establishes a central hub for IR.

The Resilient Incident Response Platform (IRP) Enterprise arms organizations with a powerful, dynamic platform for managing and resolving cyber security incidents.

IBM Resilient can help you:

  • Empower your security team to create a single hub for managing, automating, and orchestrating IR processes.
  • Align people, process, and technology for incident response.
  • Connect and unlock the value of all your security investments – and enable your organizations to measure the ROI of your security investments.
  • Build, configure, and maintain your own IR action plans within hours or days – not weeks or months.

IBM WATSON

Transform your security with the IBM Cognitive SOC, powered by Watson

The volume of threat data is exceeding the capacity of even the most skilled security professional, and organizations are drowning in a sea of information that continues to grow as rapidly as the threat landscape itself. When organizations see over 200,000 security events every day and don’t have the skills to stay ahead, where do you turn?

Introducing the IBM® Cognitive SOC. This new platform embeds Watson for Cyber Security’s unique ability to understand, reason and learn about security topics and threats. By tapping into and making sense of structured and unstructured security knowledge that has previously been elusive to an organization’s SOC (including imprecise human language contained in blogs, articles, reports), it augments a security analyst’s ability to fill gaps in intelligence, speed and accuracy.

It’s the industry’s first security operations and response platform integrating advanced cognitive technologies with IBM’s leading security solutions. The Cognitive SOC connects obscure data points humans can’t possibly identify on their own, enabling enterprises to quickly and accurately respond to threats across networks, endpoints, users and cloud.

SYMANTEC MANAGED SERVICES

ARAMA TECH offers Full Managed Services and Hybrid Managed Services for Symantec solutions for organizations who wish to deploy these technologies but do not (yet) have the required staff or knowledge level to fully manage and operate the solutions themselves.


FULL MANAGED SERVICES is a worry-free service where ARAMA TECH takes care of first line management and Operations of chosen security areas and first line response to security incidents.

HYBRID MANAGED SERVICES has a strong knowledge transfer element built-in with a gradual handover to the customers' internal organization within any chosen period of time. Thus offering organizations the possibility to deploy cutting-edge Symantec security technology and have time to grow in capacity and capability in their own pace.


SYMANTEC .CLOUD

Symantec Email Security.cloud provides always-on, inbound and outbound protection against targeted attacks, spear phishing, advanced malware, spam, and bulk mail. It includes data loss prevention technology and email encryption delivered from a global cloud platform.

Symantec Web Security.cloud safeguards customers against web-borne malware and web misuse, boosting productivity.

Symantec Enterprise Vault.cloud helps organizations better store, manage, and discover business-critical information. The service provides unlimited storage and retention for a predictable monthly fee.

Symantec Endpoint Protection Small Business Edition is managed from the cloud. It installs in minutes, updates automatically, and includes multiple layers of sophisticated protection to provide market-leading defense against even the most advanced threats facing businesses.

Disaster Recovery Orchestrator is a service designed to keep businesses up and running in the event of a disaster or any wide-spread outage. It provides automated application and data recovery services for customers using the Microsoft Windows Azure cloud platform.


Downloads:

 

Datasheet Symantec Email Security .Cloud Datasheet Symantec Web Security .Cloud Datasheet Symantec Enterprise Vault .Cloud Datasheet Symantec Endpoint Protection SBE Datasheet Symantec Disaster Recovery Orchestrator
SYMANTEC THREAT PROTECTION

Symantec gives customers comprehensive protection to help protect against the most complex cyber threats across endpoints, email, and data center with precision, by leveraging one of the largest civilian source security intelligence networks in the world, the Symantec Global Intelligence Network (GIN). The Symantec Global Intelligence Network is made up of more than 57.6 million attack sensors; monitors threat activity in over 157 countries and territories; and records thousands of events per second.

The proactive protection technologies in Symantec’s Threat Protection solutions interact directly with the Symantec Global Intelligence Network, ensuring that customers have the latest protections available to protect against the latest attacks.


SOLUTIONS:

Symantec Endpoint Protection leverages the world's largest civilian threat intelligence network to deliver advanced protection at the endpoint. This network consists of telemetry data coming from 175 million endpoints and 57 million attack sensors in 175 countries, providing unique visibility into the latest security threats.

Advanced Threat Protection combines global telemetry from one of the world’s largest cyber intelligence networks with local customer context across endpoints, networks and email, to uncover attacks that would otherwise evade detection.

Cloud email security service filtering unwanted messages and protecting your mailboxes from targeted attacks. The service has self-learning capabilities and Symantec intelligence to deliver highly effective and accurate email security. Encryption and data loss prevention help you control sensitive data. Supports Microsoft Office 365, Google Apps, on premises or hosted Microsoft Exchange, and other mailbox services.

Data Center Security enables organizations to continuously monitor and enable host-based hardening of their on-premise physical and virtual servers, AWS, and OpenStack clouds. Customers can automatically deploy agent less antimalware and guest network threat protection for their VMware environments. Symantec™ Data Center Security leverages VMware NSX to automate policy-based orchestration of security settings across Symantec and its ecosystem of third party security partners.


DOWNLOADS:

 

Datasheet Symantec Endpoint Protection Datasheet Symantec ATP:Network  Datasheet Symantec .Cloud Email Security  Datasheet Symantec Data Center Security
SYMANTEC INFORMATION PROTECTION

Know where your data is. Set policies seamlessly across mobile, cloud, and on-premises. Establish identity-based policies that govern information access.

Symantec gives IT organizations tools that enable deep visibility and the ability to control how individual users access data, with our Validation and ID Protection (VIP) single sign-on solutions. Deployed by over half of the Fortune 100 companies for data loss prevention, Symantec can help your organization connect identity as the control point to seamlessly set policies and define how data moves. Our real-time analytics technologies, with our Global Intelligence Network (GIN), increase your ability to identify risk by recognizing unusual behavior during authentication. We believe that data, identity, encryption, and authentication policies must come together to seamlessly set compliance policies and ensure protection of critical data.


SOLUTIONS:

Symantec Data Loss Prevention (DLP) delivers a comprehensive approach to information protection that embraces today’s cloud- and mobile-centered realities. With DLP, you can:

  • Discover where data is stored across all of your cloud, mobile, network, endpoint, and storage systems
  • Monitor how data is being used, whether your employees are on or off the network
  • Protect data from being leaked or stolen—no matter where it’s stored or how it’s used

Symantec Identity Access Manager is the next generation control platform that integrates Single Sign-On (SSO) with strong authentication, access control, and user management. It offers users and administrators control, convenience, and compliance for public and private cloud-based applications.


DOWNLOADS:

 

Datasheet Symantec DLP Datasheet Identity: Access Manager
HPE FORTIFY

HPE Enterprise Security levert de meest uitgebreide software security solutions voor het vinden en oplossen van software kwetsbaarheden vroeg in het ontwikkelfase ten tijdens de volledige lifecycle van een  software applicatie.  HPE Fortify borgt dat applicaties veilig zijn van start tot finish: van de ontwerp fase naar coderen, gedurende QA/Testing en in productie.

Hackers zijn onophoudelijk op zoek om misbruik te maken van kwetsbare websites en applicaties. HPE Applicatie Security oplossingen helpen bij het identificeren, verbeteren en reduceren van het kwetsbaarheid profile van enterprise applicaties en systemen.  

HPE Fortify is in staat om applicaties te inspecteren op source code niveau (vaak static code testing genoemd) en wanneer applicaties in run-time of servicing capacity zijn (productie) middels dynamische analyse - HPE WebInspect. Alle producten van de HPE Fortify Suite kunnen on-premises, in de cloud (Fortify on Demand - SaaS) of als een hybride oplossing geleverd worden.

HPE Fortify is de industrie-leidende software security oplossing dat de blootstelling van een organisatie ten aanzien van software security risico’s over de gehele enterprise vaststelt, en het algemene risico van nieuwe of in productie zijnde applicaties reduceert en tijd- en kostenbesparend werkt door het adresseren van  kwetsbaarheden over de gehele applicatie lifecycle.  HPE Fortify is geschikt voor organisaties van elke grootte om elke of alle succesvolle software security programma’s te automatiseren.

HPE FORTIFY SOFTWARE SECURITY CENTER

Een suite van geïntegreerde software security oplossingen voor het automatiseren van de processen die het meest belangrijk zijn van het ontwikkelen en deployen van veilige applicaties.  Fortify Software Security Center helpt bij het oplossen van software kwetsbaarheden over de gehele security development life cycle (SDLC).

HPE WEBINSPECT

HPE WebInspect is een geautomatiseerde en configureerbare dynamische (DAST) web applicatie security en penetratie testing tool die real-world hacking technieken en aanvallen simuleert.

HPE FORTIFY STATIC CODE ANALYZER

Static Code Analyzer (SAST) scant source code, identificeert root causes van software security kwetsbaarheden en correleert en prioriteert resultaten.

FORTIFY ON DEMAND

Statische Applicatie Security, Dynamische Applicatie Security and Mobiele Applicatie Security Analyse geleverd als dienst in the Cloud door een groot team van HPE Security Test professionals. Klanten hebben toegang tot de FoD portal waar ze de testen kunnen aanvragen en de testresultaten na de testuitvoer in duidelijke en uitgebreide dashboards kunnen zien.

HPE APPLICATION DEFENDER

HPE's applicatie zelf-protectie HP Application Defender helpt bij het blokkeren van security bedreigingen die niemand anders kan zien door het beschermen van productie applicaties van binnenuit. 

HPE ARCSIGHT

ARAMA TECH en HP Enterprise Security helpen bij het identificeren, verbeteren en reduceren van het risico profiel van enterprise systemen en applicaties en het voldoen aan en naleven van compliance met de HP ARCSIGHT suite. HP ARCSIGHT helpt bij het verkrijgen van zicht wat er in het netwerk gebeurt helpt bij het reduceren van het risico van financieel verlies en het voorkomen van reputatie schade. 

HP's ARCSIGHT is de industrie-leidende oplossing die moderne IT security bedreigingen en risico’s adresseert over alle organisaties heen, van enterprises tot midden- en klein bedrijf! Het HP ArcSight platform is het enige unieke en schaalbare platform voor het monitoren van bedreigingen en risico’s in een omgeving van niet-omgrensde netwerken, persistente bedreigingen en enterprise risico’s.

HP ARCSIGHT LOGGER

HP ArcSight Logger levert een industrie-leidende, kosten-effectieve Universal Log Management oplossing dat zoekacties, reportages, alerting en analyses samenbrengt over ieder type van enterprise machine data voor IT GRC, IT Operations, SIEM en Log Analytics. De mogelijkheden om enorme grote hoeveelheden machine data dat gegenereerd wordt in de verschillende formats te verzamelen, analyseren en opslaan maakt dat het een werkelijk universal log management oplossing is. Het ondersteunt meervoudige deployment opties zoals een hardware appliance, software, virtuele machine of in de cloud.

HP ARCSIGHT EXPRESS

HP ArcSight Express biedt volledige security visibiliteit, stelt vast of er een security incident plaatsvindt en waarschuwt security analisten tijdig om de juiste acties uit te kunnen voeren. HP ArcSight Express geeft betekenis aan gebeurtenissen door het plaatsen van de gebeurtenissen in de context van wie, wat, waar, wanneer en waarom en laat de impact op de organisatie ervan zien. Real-time alerts helpen de beheerders om te kunnen prioriteren op de meest kritische security en compliance gebeurtenissen welke plaatsvinden in de business.

HP ARCSIGHT ENTERPRISE SECURITY MANAGER

HP ArcSight Enterprise Security Manager (ESM) is de principale security event manager dat analyses, correlatie, visualisatie, rapportage, workflow en response features bij het ondersteunen van IT teams in ieder aspect van security event monitoring biedt, van compliance en risk management tot security intelligence en operations. De ArcSight ESM event log monitor werkt zich door miljoenen log bestanden heen om de kritische gebeurtenissen die plaatsvinden te vinden en ze weer te geven via dashboards, notificaties en rapporten, zodat met zeer accuraat de security risico’s en compliance overtredingen kan prioriteren.