It’s time to think outside the box with our United Security Management Box (USMB). Activity Monitoring has never been more convenient or in-depth as our USMB has made it. It’s sole purpose is to secure all privileged user activities, to locate and neutralize malicious activity from insiders. With the ability to control user access to remote IT systems, and record activities in a easy to navigate audit trails. It’s simple USMB is your toolbox to monitoring any system.
We combined the greatest ideas from industry leaders and combined them with cutting edge tech to create a Death-Star-Worthy Security Platform that does it all…USMB, making the separation from clients and servers.
By enabling ID authentication you get a network consisting of several LDAP servers all hosting public directory services and Active Directory Domain Services. For seamless integration into a secure network, USMB is a requirement
Centralize users and groups into one Management Module, enabling a batch of operations. Control IT vendor and Outsourcing Partner activities and monitor access trail all from one convenient central system for complete control. LDAP/AD server synchronization can easily be enabled for a third party user to be quickly deployed
USMB provides the best security solution for Multi-User, Multi-Asset, and Multi-Authorization systems. Help any user to comply with local and international industry standards such as PCI DSS, SOX, ISO27001, and more. USMB allows the authorizer to allow, track and even terminate the administrator’s access to the server
USMB makes all user activity traceable by recording them in high quality, tamper-proof and easy-to-find audit trails, ensuring that all of your sensitive information is accessible for ad-hoc analysis or customized activity reports
• System Protection
Windows, Linux, and Unix servers
Networking devices (routers, switches, etc.)
Security devices (Firewalls, IDS/IPS, etc.)
• Policy Engine
In addition to providing a detailed record of activities, the Policy Engine can control user activities by configuring access, behavior and audit policies
• Alert Module
The Alert Module supports the Syslog protocol, which enables you to send the security logs by email in addition to being able to send them in real time by syslog
• Deployment Mode
USMB implements the Physical Bypass Deployment Mode, making USMB a single internal checkpoint via its Network Access Control App
• Real-Time Monitor
USMB operates transparently and monitors all privileged user activity in real time.
• Events Search & Forensics
USMB records all sessions into easy-to-find audit trails giving you the completely unique ability to replay all user actions as it appeared on their monitor. Thus, making it easy to find relevant forensic information
• Access Control Lists
USMB implements Access Control Lists based on the policies of IP/IP segment, User/user group, Asset/Asset group, protocol, Time and Risk Level to control the privileged users’ access.
Uses a compact Flash Card and/or a Mechanical Hard Disk as double-restore the infrastructure
Uses a specific operation system combined with RAID and HA technologies as triple redundancy guarantee.
1. Intelligently Modeling for Authorization
USMB enables intelligent identification of user behavior that deviates from normal access patterns. Alert and terminate suspicious activities that may indicate privilege abuse.
Users performing unauthorized activities can be quarantined and made available for review
2. Virtual Application Center
The Virtual Applications Center allows the user to arbitrarily extend applications. By application virtualization, enabling the Single Sign-On (SSO), the detailed audit we provides privilege control for HTTP/HTTPS, Oracle/SQL Servers, KVM, AS390/AS400
3. Automatic Password Change
USMB’s immediate password change mechanism enables automatic password change via encrypted protocols (RPC, telnet, and SSH) by simulating manual password change. It also has the capability to automatically retrieve a discarded password whenever a human error may be in question