Beyond Security | Technology Partners

Integration – vital to security

Beyond Security has partnered with the following companies to deliver excellence in network and application security testing.

Are you interested in an integration or technology partnership?
Contact us at partners@beyondsecurity.com


AlgoSec

AlgoSec is a provider of software for network security policy management, also known as firewall policy management. AlgoSec’s products automate the management and enforcement of security policies across firewalls, routers, virtual private networks, and related security devices.

By leveraging AlgoSec’s visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer. In addition, beSECURE can inform AlgoSec of vulnerabilities discovered which in turn can be use by AlgoSec to determine what changes to rules should take place.

Link: AlgoSec

Amazon Web Services (AWS) provides trusted, cloud-based solutions to help you meet your business needs. The AWS Cloud makes a broad set of services, partners, and support options easily available to help make sure that you can focus on what will make your solution a success.

Link: Amazon AWS

ArcSight Enterprise Security Manager (ESM) is the market-leading security correlation engine used by the most demanding public and private organizations in the world. It protects these firms from external threats such as bots and worms, and internal risks such as fraud and theft.

beSECURE, the Automated Vulnerability Detection System, is integrated with ArcSight ESM to provide vulnerability assessment data.

Link: ArcSight ESM

BMC Remedy is an IT Service Management solution that boasts reduced complexity and seamless integration of customer support, change, asset and request management.

By feeding vulnerability report information directly into Remedy, beSECURE, the Automated Vulnerability Detection System, helps automate remediation planning.

Link: BMC Remedy

censys

Censys is a public search engine that enables researchers to quickly ask questions about the hosts and networks that compose the Internet. Censys and beSECURE, the Automated Vulnerability Detection System, have been integrated to share vulnerability information.

Link: Censys

Check Point Logo

Check Point is a multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.

beSECURE, the Automated Vulnerability Detection System, is integrated with Check Point security policy enforcement to provide automated and quick response to security threats by blocking potential threats.

Link: Check Point

Service desk software from CA Technologies lets you optimize the business user’s support experience. Gain the ability to deliver high-quality, consistent IT service support with Service Desk Manager.

CA Service Desk and beSECURE, the Automated Vulnerability Detection System, have been integrated to share vulnerability information.

Link: CA Service Desk

Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.

Link: Centrify PAM

Cisco Logo

Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches. The purpose is to simplify identity management across diverse devices and applications.

Integration between beSECURE and Cisco ISE allows beSECURE to instruct the ISE to block devices present on the network that pose a security risk from accessing sensitive parts of the network.

Link: Cisco ISE

CORE IMPACT streamlines penetration testing of servers, desktop systems, end-user systems, web applications, wireless networks, network devices, and mobile devices by automating tasks that would traditionally require significant time, effort and expertise to perform. CORE IMPACT automates the accepted best practice for performing penetration tests.

CORE IMPACT depends upon beSECURE, the Automated Vulnerability Detection System, to identify vulnerabilities that it then attempts to exploit.

Link: CoreSecurity – Core Impact

eNMS

eNMS is a Free and Open Source Software designed for building workflow-based network automation solutions.

By leveraging eNMS visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer.

Link: eNMS

ExtraHop

ExtraHop Networks is an enterprise cyber analytics company headquartered in Seattle, Washington. ExtraHop helps organizations understand and secure their environments by analyzing all network interactions.

By leveraging ExtraHop visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer.

Link: ExtraHop

F5’s Web Application Firewall, Application Security Manager™ (ASM), integrates with beSECURE, the Automated Vulnerability Detection System, so as to provide the most up to date security policy possible. By using beSECURE output, ASM updates its security policy to protect against the vulnerabilities that beSECURE discovered. You can choose which of the vulnerabilities you want the security policy to handle, retest to be sure that the security policy protects against the vulnerabilities, then enforce the security policy when you are ready.

Link: F5

Freshworks

Freshdesk from Freshworks is an online cloud-based customer service software providing helpdesk support with all smart automations to get things done faster.

By integrating beSECURE and Freshdesk, beSECURE can notify support staff of vulnerabilities being discovered and have them resolve them quickly and efficiently.

Link: Freshdesk

Genian Logo

Genians delivers Next-Gen NAC solutions by leveraging Cloud technology for businesses of all sizes without disturbing your existing IT and security operations.

beSECURE and Genian NAC can work together to both track and scan connected devices as well as quarantine devices that do not meet the security policy of the organization.

Link: Genian NAC

IBM Security QRadar SIEM can also correlate system vulnerabilities with event and network data, helping to prioritize security incidents.

Qradar is integrated with and depends upon beSECURE to identify network vulnerabilities.

Link: IBM QRadar

Illumio prevents the spread of breaches inside data center and cloud environments. Customers use Illumio to reduce cyber risk and achieve regulatory.

By leveraging Illumio visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer.

Link: Illumio

ISC BIND9

ISC BIND 9 is a very flexible, full-featured DNS system. Whatever your application is, BIND 9 probably has the required features.

By integrating beSECURE with ISC BIND9, customers can continuously scan their infrastructure for any internet facing devices without needing to manually add scan entries to their system.

Link: ISC BIND9

(ISC)

ISC DHCP

ISC DHCP offers a complete open source solution for implementing DHCP servers, relay agents, and clients. ISC DHCP supports both IPv4 and IPv6, and is suitable for use in high-volume and high-reliability applications.

Integration between beSECURE and ISC DHCP allows customers to immediately scan any new server, desktop or mobile that comes into the network and perform actions based on the vulnerability scan findings.

Link: ISC DHCP

Imperva is the global leader in data security. With more than 1,300 direct customers and 25,000 cloud customers, Imperva’s customers include leading enterprises, government organizations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders.

Link: Imperva

Jira Software logo

Jira allows you to plan, track, and manage your agile and software development projects in Jira. Customize your workflow, collaborate, and release great software.

By integrating beSECURE and Jira, beSECURE can notify support staff of vulnerabilities being discovered and have them resolve them quickly and efficiently.

Link: Jira Software

Quest KACE Logo

Quest KACE, formerly Dell KACE, is a company that specializes in computer appliances for systems management of information technology equipment. It also provides software for security, application virtualization, and systems management products.

By integrating beSECURE and KACE, beSECURE can notify support staff of vulnerabilities being discovered and have them resolve them quickly and efficiently.

Link: Quest KACE

Kenna is a software-as-a-service platform that processes external Internet breach and exploit data with an organization’s vulnerability scan data to monitor, measure and prioritize vulnerability remediation across their IT environment.

Kenna and beSECURE, the Automated Vulnerability Detection System, have been integrated to share vulnerability information.

Link: Kenna Security

libreNMS

LibreNMS is a fully featured network monitoring system that provides a wealth of features and device support.

By leveraging LibreNMS visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer.

Link: LibreNMS

With LogPoint, you have full SIEM and adapted to large enterprises. LogPoint is certified EAL 3+ and specifically addresses the challenges of managing security within your business, whether for EU GDPR compliance, post-incident analysis and visibility into your operations.

Link: LogPoint

Metasploit

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

By integrating Metasploit with beSECURE, tasks previously done manually (such as vulnerability detection and analysis) can now be done seamlessly. Take the scan results from beSECURE and immediately exploit it using Metasploit through this easy to use integration.

Link: Metasploit

The Microsoft Azure Certified program was created to empower Microsoft partners to grow their business through new opportunities to promote and sell their applications and services on Azure. The program will begin as Microsoft Azure Certified for Virtual Machines, with applications from commercial application developers offered as virtual machines that are deployable from the Azure Management Portal. Microsoft will provide comarketing assistance and access to the Azure customer base to help drive application sales for applications that have been Microsoft Azure Certified

Link: Azure

Microsoft Security TechCenter provides security bulletins, educational materials and product updates.

beSECURE reports link directly to the applicable Knowledge Base articles providing instant access to the solutions of Microsoft related security issues.

Link: Microsoft Technology Center

The Security Development Lifecycle (SDL) is a software development security assurance process consisting of security practices grouped by seven phases: training, requirements, design, implementation, verification, release, and response. The SDL Pro Network is a group of security consultants, training companies, and tool providers that specialize in application security and have substantial experience and expertise with the methodology and technologies of the SDL.

Beyond Security is a member of the SDL Pro Network and beSTORM is a listed tool.

Link: Microsoft SDL

OpenVPN

OpenVPN provides flexible VPN solutions to secure your data communications, whether it’s for Internet privacy, remote access for employees, securing IoT, or for networking Cloud data centers. Our VPN Server software solution can be deployed on-premises using standard servers or virtual appliances, or on the cloud.

beSECURE integration with OpenVPN allows beSECURE to scan newly formed VPN connections for security vulnerabilities, both through their internet facing IP address as well as their internal VPN connection. The vulnerability information gathered can then be used to isolate the VPN connection if security risks arise.
Link: OpenVPN

Portnox Logo

Portnox: Network Security. Simplified. See, control and manage all users and devices – even BYOD and IoT – accessing your network with on-premise and cloud.

beSECURE, the Automated Vulnerability Detection System, is integrated with Portnox security policy enforcement to provide automated and quick response to security threats by blocking potential threats.

Link: Portnox

Pluron, Inc. is a web startup based in Silicon Valley. Our main product is Acunote – an Agile project management tool built on the innovative lightweight Scrum process.

beSECURE, the Automated Vulnerability Detection System delivers Acunote-ready vulnerability report data allowing Scrum managed remediation.

Link: Pluron

NetProfiler

Riverbed NetProfiler is a centralized reporting & analysis console that you can use to quickly view network & application performance & troubleshoot issues.

By leveraging Riberbed NetProfiler visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer.

Link: Riverbed NetProfiler

Rumble Discovery is a product of Critical Research Corporation. Rumble’s mission is to help their customers identify, manage, and monitor their networked IT assets as effectively as possible, without getting in their way.

By leveraging Rumble Discovery visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer.

Link: Rumble Discovery

RSA Archer GRC modules allow you to build an efficient, collaborative enterprise governance, risk, and compliance (GRC) program across IT, finance, operations, and legal domains. With RSA Archer, you can manage risks, demonstrate compliance, and automate business processes.

RSA Archer GRC and beSECURE, the Automated Vulnerability Detection System, have been integrated to share vulnerability information.

Link: RSA Archer GRC

Shodan Logo

Shodan is a search engine that lets the user find specific types of computers connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client. Shodan.io and beSECURE, the Automated Vulnerability Detection System, have been integrated to share vulnerability information.

Link: Shodan.io

Slack Logo

Slack is where work flows. It’s where the people you need, the information you share, and the tools you use come together to get things done. Add beSECURE notification and control right to your support and IT staff channel, allowing them visibility, notification and control of the beSECURE product right from Slack’s channels.

Link: Slack

By monitoring and analyzing everything from customer clickstreams and transactions to network activity to call records, Splunk turns your machine data into valuable insights. Troubleshoot problems and investigate security incidents in minutes (not hours, or days).

beSECURE, the Automated Vulnerability Detection System, seamlessly feeds scanning data into Splunk for centralized security data management and distribution of graphic vulnerability results to key staff and executives.

Link: splunk

Symantec Security Information Manager enables a documented, repeatable process for security threat response and IT policy compliance via integrated log management and incident response solutions.

beSECURE, the Automated Vulnerability Detection System, exports vulnerability incidents to the Security Information Manager allowing coordinated incidence response.

Link: Symantec – Security information manager

SolarWinds Logo

SolarWinds Orion Platform is a comprehensive bandwidth performance management and fault management application that allows you to view the real-time statistics of your network directly from your web browser.

By leveraging SolarWinds Orion visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer.

Link: SolarWinds Orion

SysAid is an IT service management solution that offers all the ITIL essentials. It’s everything you need for easy and efficient ITSM in a single tool.

By leveraging SysAid visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer.

Link: SysAid

Tufin automates and orchestrates security policies across firewalls and hybrid cloud to meet the demands of the digital business.

By leveraging Tufin visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer.

Link: Tufin

TOPdesk helps organizations improve their services by offering user-friendly, standardized software. This personal approach has been successful for over 17 years now. Currently, 4,000 organizations in 40 countries use TOPdesk for IT, Facilities, HR and Shared Service Centres.

beSECURE, the Automated Vulnerability Detection System, delivers vulnerability information to TOPdesk for integration into its incident management workflow.

Link: TOPdesk

Trustwave SIEM Operations Edition is event management software for the enterprise – scalable, flexible and easily integrated with the enterprise infrastructure. SIEM OE automatically transforms logs into security events and prioritizes high risk events, providing actionable alerts to help businesses stay secure and compliant.

By feeding it vulnerability test results, beSECURE, the Automated Vulnerability Detection System, enables the log management functionality offered by SIEM OE.

Link: Trustwave SIEM

vSphere is a VMware cloud computing platform for virtualization. It includes an updated vCenter Configuration Manager, as well as vCenter Application Discovery Manager, and the ability of vMotion to move more than one virtual machine at a time from one host server to another.

beSECURE integration with vSphere allows virtual machine owners to automatically scan their virtual infrastructure and get up to date information on the security posture of their virtual environment.

Link: VMware

A software company providing cyber security solutions, WALLIX Group is a European specialist in privileged account governance.

In response to recent regulatory change (NIS/GDPR in Europe and OVIs in France) and the cyber security threats affecting all companies today, Bastion helps users protect their critical IT assets: data, servers, terminals and connected objects. It is the first market solution to have been awarded first-level security certification (CSPN) by France’s National Cybersecurity Agency (ANSSI) and thus meet all of the criteria for regulatory compliance.

Link: Wallix – Bastion

Reposify provides a complete visibility into exposures, misconfigurations, vulnerabilities and shadow IT with an automatic, 24/7 outside-in view of all your internet-facing assets.

Reposify and beSECURE, the Automated Vulnerability Detection System, have been integrated to share vulnerability information.

Link: Reposify

Zabbix is a mature and effortless enterprise-class open source monitoring solution for network monitoring and application monitoring of millions of metrics.

By leveraging Zabbix visibility of the customer’s network beSECURE can scan every end point of the customer’s network and provide a comprehensive security posture to the customer.

Link: Zabbix

Zendesk Logo

Zendesk customer service and sales CRM software is designed to create better customer relationships. Build the best customer experiences with Zendesk.

By integrating beSECURE and Zendesk, beSECURE can notify support staff of vulnerabilities being discovered and have them resolve them quickly and efficiently.

Link: Zendesk

Talk to Us