skip to Main Content
[cs_content][cs_section parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_angle_point=”50″ style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ style=”padding: 0px;”][x_image type=”none” src=”http://www.aliasforensics.com/wp-content/uploads/2016/02/blackbox_large_transparent-1.png” alt=”” link=”false” href=”#” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][/cs_row][/cs_section][cs_section bg_color=”#ffffff” parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_angle_point=”50″ style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto 25px;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ style=”padding: 0px;”][x_custom_headline level=”h2″ looks_like=”h3″ accent=”true” class=”cs-ta-center man”]Features in Detail[/x_custom_headline][/cs_column][/cs_row][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”true” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ class=”cs-ta-left” style=”padding: 0px;”][x_accordion link=”true” id=”faq-1″][x_accordion_item title=”Intrusion Prevention” open=”false”]

Monitoring your network traffic for malicious activity, classifying the threat level of the activity, logging information about the activity, and attempt to block/stop it.

[/x_accordion_item][x_accordion_item title=”Realtime Anti-Virus” open=”false”]

Monitoring all files transmitted via the network for viruses, and blocking them before they can reach their destination.

[/x_accordion_item][x_accordion_item title=”Full Management” open=”false”]

Full remote management with no on-site configuration allows your company to ensure that security systems are not bypassed by an internal user, and that all configuration changes are approved.

[/x_accordion_item][x_accordion_item title=”IP Blacklisting” open=”false”]

Blocking known Malware and Virus repositories, infected websites, and botnet command and control centers. Also blocking traffic to areas/countries that your business does not transact with.

[/x_accordion_item][x_accordion_item title=”HTTPS Scanning” open=”false”]

Scanning encrypted web traffic for Viruses, Malware, potential exfiltration techniques as well the data inside the traffic.

[/x_accordion_item][x_accordion_item title=”Realtime Updates” open=”false”]

Updating Virus and Malware signatures in realtime as they are created, as well as updating software processes as needed without downtime.

[/x_accordion_item][x_accordion_item title=”Application Control” open=”false”]

Disabling specific user-defined applications from accessing your network. Applications such as BitTorrent, Skype, Pandora, and others can be blocked to increase productivity and decrease bandwidth usage.

[/x_accordion_item][x_accordion_item title=”FFIEC, PCI, HIPAA” open=”false”]Helps your business meet the standards required to achieve FFIEC, PCI and HIPAA compliance.[/x_accordion_item][x_accordion_item title=”24/7 Support” open=”false”]Night and Day access to technical assistance to increase uptime.[/x_accordion_item][x_accordion_item title=”Failsafe Pass-through” open=”false”]The ability for the BlackBox to continue to pass network traffic (unprotected) in case of complete hardware failure to increase uptime.[/x_accordion_item][x_accordion_item title=”Maximum Nodes” open=”false”]The BlackBox’s ability to handle network devices such as computers, servers, and wireless devices.[/x_accordion_item][/x_accordion][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/2″ style=”padding: 0px;”][x_accordion link=”true” id=”faq-2″][x_accordion_item title=”24/7 Human Monitoring” open=”false”]

Full-time, hands-on security auditing by a human, without the traditional costs associated with a Security Team.

[/x_accordion_item][x_accordion_item title=”Log / Alert Monitoring” open=”false”]

Inspecting log files for abnormalities (Command and Control), as well as listening for alerts that indicate action is required immediately.

[/x_accordion_item][x_accordion_item title=”Incident Response” open=”false”]Investigating the exact nature of, and crafting the correct response to a security incident such as a data breach.[/x_accordion_item][x_accordion_item title=”Incident Remediation” open=”false”]Implementing the steps and processes required to ensure that a security incident does not reoccur in the future.[/x_accordion_item][x_accordion_item title=”Realtime Anti-Malware” open=”false”]

Monitoring all files transmitted via the network for known malware, and blocking it before the payload (virus) can be downloaded.

[/x_accordion_item][x_accordion_item title=”Full Content Filtering” open=”false”]

Controlling the internet viewing habits of employees by limiting access to user-defined categories such as Gambling, Shopping, Gaming, Pornography, etc.

[/x_accordion_item][x_accordion_item title=”Active Directory Linking” open=”false”]

Per-User logging and blocking based on the user’s Windows Domain Active Directory account.

[/x_accordion_item][x_accordion_item title=”Offsite Config. Backup” open=”false”]

Securely storing your BlackBox configuration files offsite in case of hardware failure to decrease recovery times.

[/x_accordion_item][x_accordion_item title=”Log Retention” open=”false”]The BlackBox’s capacity to store full network logs.[/x_accordion_item][x_accordion_item title=”Offsite Log Retention” open=”false”]Complete, secure, offsite backup of all logged data for as long as you have BlackBox services.[/x_accordion_item][x_accordion_item title=”Maximum Throughput” open=”false”]The BlackBox’s ability to process network traffic, at maximum capacity.[/x_accordion_item][/x_accordion][/cs_column][/cs_row][/cs_section][/cs_content]
Back To Top