Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Our innovative virtual networking strategy utilizes a range of software elements designed to channel, route, and accelerate application data, thereby greatly improving network security, reliability, and efficiency across various devices such as laptops, tablets, smartphones, and Internet of Things (IoT) gadgets. The Dispersive™ Virtual Networks represent a patented, military-grade overlay solution based on multi-path software-defined networking. This approach involves software components that work in unison to manage traffic, effectively boosting security, dependability, and performance for all connected devices, including laptops, tablets, mobile phones, and IoT devices. At the authenticated source, data streams are divided and reassigned with a Dispersive™ Virtual Network (DVN) header, which directs traffic along multiple network paths according to the directives from the Dispersive™ Virtual Network (DVN) Controller, which may operate across one or several physical circuits. By utilizing this architecture, the Dispersive™ Virtual Network (DVN) guarantees reliable packet delivery and significantly enhances the quality of service experienced by users. In doing so, it ensures a seamless and secure networking experience that adapts to the diverse needs of modern digital environments.

Description

The PT ISIM hardware appliance provides continuous oversight of ICS network security, aids in the early identification of cyberattacks, detects both negligent and malicious behavior from personnel, and facilitates adherence to cybersecurity laws and industry standards. Its user-friendly ICS connection and adaptive technology make PT ISIM especially suitable for small enterprises that may have limited security resources. Additionally, PT ISIM can effectively support a security operations center (SOC), enabling comprehensive monitoring of ICS threats and streamlined security management across multiple locations. Its adaptable component configuration allows for rapid and straightforward deployment with minimal setup needed, making it applicable to businesses in various sectors. No matter whether a company opts for a swift or gradual expansion, scaling remains seamless even within intricate network environments. Furthermore, it is important to note that the monitoring framework of PT ISIM operates solely in a passive mode.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Google Cloud Platform

Integrations

Amazon Web Services (AWS)
Google Cloud Platform

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Dispersive Networks

Founded

2010

Country

United States

Website

dispersive.io/technology/

Vendor Details

Company Name

Positive Technologies

Founded

2002

Country

Russia

Website

www.ptsecurity.com/ww-en/products/isim/

Product Features

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

VPN

Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label

Product Features

Incident Management

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Alternatives