Agilesec Agent

Endpoint Detection and Response

Today’s security best practices are tomorrow’s security vulnerabilities. Cryptography is key to secure system design but it ages over time. Researchers study and reveal weaknesses in an algorithm and overnight these weaknesses are codified in security exploits that attempt to break into systems. Software may have been designed with state-of-the-art crypto decades ago but not upgraded since. Backwards compatibility considerations prevent the software from using the most recent and secure cryptographic algorithms.

CTIR is a security management tool that helps alleviate these problems by examining software throughout a network and creating an inventory of cryptographic implementations found in compiled software on each network end point. The agent flags instances of old, antiquated or broken cryptography and identifies software with publicly known cryptographic issues.

Delivering end-point detection and response

Platform agnostic
agent runs on Windows, Linux and MacOS
hosts
Scans all software for
signature
evidence of cryptographic implementations
Finds known instances of software using
cryptography.
Hunts for software with unidentified
cryptographic usage.
Reports on software with known cryptographic or security vulnerabilities.

Clear and Actionable Reporting
Cryptographic Threats And Vulnerabilities

The Agilesec CTIR Agent provides:

  • Continuous real time crypto monitoring for the entire network
  • Aggregate reporting for all hosts on the network
  • Cloud based or on-premises crypto management for the organization
  • Configure organization crypto policy and hunt for deviations
Need to establish your cyber security strategy?
Contact our cyber assurance experts.
Contact us

Case Studies and White Papers

Whitepaper
IoT and Security
Security assessment of various models of smart thermostats conducted by Infosec Global experts. The devices were compared based on their approach to security, including the used methods of communication, encryption, and authentication.
February 28, 2017
Case Study
pfSense Case Study
pfSense security appliance evaluation
February 5, 2017