- sales@camissatechnologies.com
- Cape Town, Western Cape
0
Happy Clients
Camissa Technologies’ Software-as-a-Service (SaaS) delivery model, allows users to access SOC from any Web browser. This unique SaaS platform leveraged on our vendor SOC enables organizations to assess and manage its security exposures freeing them from the substantial cost, resource and deployment issues associated with traditional software products.
Intelligent SOC is capable of managing Internet exposed vulnerabilities as well as vulnerabilities found on hosts that are not directly accessible from the Internet.
We offer a cloud-based solution that detects vulnerabilities on all networked assets, including servers, network devices (e.g. routers, switches, firewalls, etc.), peripherals (such as IP-based printers or fax machines) and workstations. Qualys can assess any device that has an IP address. We work both from the Internet to assess perimeter devices as well as from the inside of your network, to assess risk from an internal perspective, using secure, hardened sensors.
Our CyberSecurity Solutions, which informs you of known vulnerabilities in your infrastructure. Qualys can even tell you if you are vulnerable to a new exposure before you perform a scan!
My company recently performed an annual security audit with the help of a consulting firm. Why do I need Camissa Technologies? In the past, scanning your networks once a year or once a quarter was sufficient.
However, with the average time between vulnerability detection and exploitation diminishing each year, annual audits are no longer frequent enough. With our Intelligent always on monitoring ability you can fully automate security assessments and reduce the time between audits from yearly or quarterly, to monthly, weekly or, even daily. You can decide how often a vulnerability assessment is required; varying from device to device, from network to network. Scans can be scheduled or performed on demand. Also, with our subscription, customers are entitled to an unlimited number of scans.
Most customers schedule weekly scans and conduct on demand scans after a security policy change, or on a new device before it is deployed into a production environment.
Stored data is kept in an encrypted format. Vendors encrypts each users’ data uniquely, so that only the user who created the data can access it. There has no insight into customer data. In fact, Vendor does not have access to the encryption key, and no ability to decrypt the stored data is possible
Our Vendor of choice – Qualys Cloud Platform resides behind network-based, redundant, highly-available firewalls and intrusion monitoring solutions. In addition, each host runsa localized firewall on top of the customized, hardened Linux distribution, which is unique to Qualys.
The Qualys Cloud Platform is hosted in a data center that is subject to at least an annual SSAE 16 or industry standard alternative audit by an internationally-recognized accounting firm. All Qualys devices are located in physically secure, dedicated, locked cabinets protected by multiple-factor authentication, including biometrics.
We offer a range of advanced managed cyber security solutions
Our swift, reliable and agile solutions.
Copyright © 2022. All rights reserved.