Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Our innovative virtual networking strategy utilizes a range of software elements designed to channel, route, and accelerate application data, thereby greatly improving network security, reliability, and efficiency across various devices such as laptops, tablets, smartphones, and Internet of Things (IoT) gadgets. The Dispersive™ Virtual Networks represent a patented, military-grade overlay solution based on multi-path software-defined networking. This approach involves software components that work in unison to manage traffic, effectively boosting security, dependability, and performance for all connected devices, including laptops, tablets, mobile phones, and IoT devices. At the authenticated source, data streams are divided and reassigned with a Dispersive™ Virtual Network (DVN) header, which directs traffic along multiple network paths according to the directives from the Dispersive™ Virtual Network (DVN) Controller, which may operate across one or several physical circuits. By utilizing this architecture, the Dispersive™ Virtual Network (DVN) guarantees reliable packet delivery and significantly enhances the quality of service experienced by users. In doing so, it ensures a seamless and secure networking experience that adapts to the diverse needs of modern digital environments.
Description
The PT ISIM hardware appliance provides continuous oversight of ICS network security, aids in the early identification of cyberattacks, detects both negligent and malicious behavior from personnel, and facilitates adherence to cybersecurity laws and industry standards. Its user-friendly ICS connection and adaptive technology make PT ISIM especially suitable for small enterprises that may have limited security resources. Additionally, PT ISIM can effectively support a security operations center (SOC), enabling comprehensive monitoring of ICS threats and streamlined security management across multiple locations. Its adaptable component configuration allows for rapid and straightforward deployment with minimal setup needed, making it applicable to businesses in various sectors. No matter whether a company opts for a swift or gradual expansion, scaling remains seamless even within intricate network environments. Furthermore, it is important to note that the monitoring framework of PT ISIM operates solely in a passive mode.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Dispersive Networks
Founded
2010
Country
United States
Website
dispersive.io/technology/
Vendor Details
Company Name
Positive Technologies
Founded
2002
Country
Russia
Website
www.ptsecurity.com/ww-en/products/isim/
Product Features
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
VPN
Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label
Product Features
Incident Management
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Incident Response
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management