Shield X Logo

Integrated Security Platform

Introduction

Integrated Security Platform

Shield-X provides a comprehensive security platform that seamlessly integrates multiple cybersecurity services to enhance your organization’s security posture, detect threats, and maintain compliance. Our dedicated team will handle the setup and configuration of Shield-X according to your specific requirements and infrastructure needs.

Decorative Image
Decorative Image

Key Features:

01

Intrusion Detection

Shield-X combines Network Intrusion Detection System (NIDS) and Host-based Intrusion Detection System (HIDS) capabilities to identify and prevent potential security breaches.

NIDS analyzes network traffic, detecting malware attacks, network scanning, and suspicious behaviors.

HIDS monitors host activity, including file changes, unauthorized access attempts, and malicious processes.

02

Log Management

Shield-X collects, normalizes, and analyzes logs from multiple sources, offering centralized visibility into security events.

Real-time alerts and log correlation help identify potential security incidents and advanced threats.

It enables proactive threat hunting and seamlessly integrates with SIEM systems and threat intelligence feeds.

03

File Integrity Monitoring (FIM)

Shield-X monitors critical system files and directories for unauthorized modifications or tampering.

Compliance monitoring ensures adherence to regulatory requirements, generating audit reports for accountability.

04

Security Event Correlation

Shield-X correlates security events from diverse sources, providing a holistic view of potential threats and identifying attack patterns.

Leveraging the MITRE ATT&CK framework, it maps detected events to specific adversary tactics and techniques.

05

Vulnerability Assessment

Shield-X integrates with vulnerability assessment tools to identify and prioritize system vulnerabilities.

It scans and analyzes network services, applications, and configurations for known vulnerabilities.

06

Compliance Monitoring and System Audits

Shield-X includes built-in compliance checks and rulesets for regulatory frameworks such as PCI-DSS, HIPAA, and GDPR.

System audits assess the security posture of your environment, identifying misconfigurations and vulnerabilities.

07

Security Configuration Assessment

Shield-X automates security configuration assessments, identifying insecure settings and misconfigurations.

It compares configurations against best practices, providing remediation recommendations.

08

Scalability and Integration

Shield-X supports a distributed architecture, ensuring scalability for monitoring large and complex environments.

It seamlessly integrates with other security tools, including SIEM systems and orchestration platforms.

Tailored Security Solutions for Your Unique Needs

Shield-X, customizing it to align with your specific security goals. With our integrated security platform encompassing intrusion detection, log management, file integrity monitoring, security event correlation, vulnerability assessment, compliance monitoring, system audits, and security configuration assessment capabilities, you can trust us to deliver a tailored solution that safeguards your valuable assets. Please note that while we provide the setup and configuration, ongoing monitoring of the security platform will be your responsibility.

Decorative Image
Decorative Image
Decorative Image

Requirements for Service Provision

In order to provide this service, there are certain requirements that need to be fulfilled

Decorative Image
Designated Space or Computer

We would require a designated space on your server infrastructure where we can install a virtual machine (VM) with all the necessary services. Alternatively, you have the option to supply a computer for us to configure and deploy with the Shield-X platform. This ensures that the monitoring system has the resources it needs to operate effectively. For added convenience, we offer the option of a pre-configured device that comes with all the required software and configurations. This device is ready to be plugged into your network, saving you the time and effort of setting it up. Please note that the pre-configured device would incur an additional cost.

Decorative Image
Access to Devices or Client Installation

To enable monitoring and configuration of the network devices, we would require access to these devices. This can be achieved either by granting us access to install the monitoring agent and configure the devices, or we can guide your internal IT team on how to perform the installation and configuration process. This ensures that the monitoring system is properly integrated with your infrastructure.

By Fulfilling these requirements

We can proceed with setting up and configuring the monitoring system, empowering you to effectively monitor and maintain your infrastructure’s security and performance.

Decorative Image
Pricing Plan

Security is just a click away

Decorative Image

€31.30

Per Month Billed Anually

  • €3.13 per device
  • Package for 10 Devices
Decorative Image

€67.75

Per Month Billed Anually

  • €2.71 per device
  • Package for 25 Devices
Decorative Image

€130.50

Per Month Billed Anually

  • €2.61 per device
  • Package for 50 Devices
Decorative Image

€230

Per Month Billed Anually

  • €2.30 per device
  • Package for 100 Devices
Decorative Image

€460

Per Month Billed Anually

  • €1.84 per device
  • Package for 250 Devices
Decorative Image

€835

Per Month Billed Anually

  • €1.67 per device
  • Package for 500 Devices
Decorative Image
Decorative Image

Pricing Structure

In our pricing structure, when we refer to “devices,” we are specifically addressing network devices and any other system-related equipment, excluding workstations, IP cameras, and IP Telephony. These devices play a crucial role in the overall functionality and performance of your network and systems. By identifying and categorizing them separately, we can ensure transparent and accurate pricing tailored to your specific technology infrastructure needs, allowing you to optimize your investment in the right areas.