Our Services
Cyberhive Security | Services
OUR SERVICES
WHAT WE OFFER
CYBERHIVE SECURITY FEATURES
CyberHive Security has strategically partnered with cybersecurity solution vendors for all possible security layers to give you, the client, the best variety of products and services along with the latest next generation, disruptive technologies. Examples include, but are not limited to:
Web Server Security
- Web App Firewall
- Web Security
- Secure Cloud Based Management
- Gateway Cloud Services
- Zero-Day Threat Protection
- Spyware Protection/Targeted Attacks
- Onsite or Virtual Appliances Deployment
Application Security
- Dynamic Application Security Testing (DAST)
- Static Application Security Testing (SAST)
- Interactive Application Security Testing (IAST)
- Run-time Application Security Protection (RASP)
- Mobile Application Security Testing
- Source Code Analysis
- eLearning
Endpoint
- Antimalware
- Antivirus
- AntiSpyware
- Management
- Patch Management
- ZeroDay Threat Detection and Prevention
Mobile
- Enterprise Mobility Management
- Anti-malware
- Anti-virus
- Anti-spyware
- Encryption
- Mobile Application Security Testing
Mobile App Protection
- Application Code Resilience
- Proactive Zero Day Protection
- App Health Monitoring
- Vulnerability Analysis
- Realtime Attack Monitoring and Alerts
- App Base Demographics
- App Environment Discovery
Internet Of Things (IoT) – Medical Devices
- Inventory Connected Medical Devices
- Risk Assessment
- Medical Device Security
- Accelerated Network Security
- Discover, Track & Group Devices
- Threat Detection
- Isolate & Protect Auto Policy Generation
Security Intelligence
- Log Management
- SIEM
- Advanced Analytics/Metrics
- Threat Intelligence
- Monitoring and Alerting
- Dashboards and Visualizations
- Machine Learning Toolkits
Perimeter & UTM
- Gateway Firewall/UTM (unified threat management)
- Email Security Gateway
- IPS/IDS/IDP
- URL Filtering, Web Gateway
- VPN Concentrator
- Sandboxing and APT Protection
Identity & Access
- Active Directory Security
- Directory Management
- Identity and Access Management (IAM)
- User Provisioning
Data
- Encryption
- Backup and Restore
- Device Control
- Database Activity Monitoring
- Data Loss Prevention
- Data and Discovery Classification
Advanced Fraud
- Customer Fraud
- Criminal Fraud
- Mobile
Insider Threat (Healthcare)
- Detect Clinical Drug Diversions
- Eliminate False Positives
- Prevent Theft of Narcotics
- Integrate Clinical Reasoning
- Protect Patients & Workers
Business Risk Intelligence
- Intelligent, Tactical Reporting
- Deep & Dark Web Monitoring
- Intuitive Pivoting
- Assess Emerging Threats Targeting Customers, Employees/Executives and Data
- Actor Profile Reports
- Impact-Based Response Services
- Brand Monitoring
Content Delivery Network (CDN)
- 24/7/365 Enterprise-Grade Support (phone, email, chat)
- 100% uptime guarantee
- Enterprise DDoS Protection & Network Prioritization
- Advanced Web Application Firewall (WAF) & Unlimited Custom Rulesets
- Role-based Account Access
- Multiple Custom SSL Certificate Uploads
- Access to Raw Logs
- Named Solution & Success Engineers
Cloud Access Security Broker (CASB)
- Visibility – Sanctioned/Unsanctioned IT Discovery
- Consolidated Organizational Service Usage
- User Access Visibility
- Device and Location Specification
- Security Posture Assessment
- Data Security
- Enforce Data-Centric Security Policies