Linking security and operations together ensuring uptime and performance.

ONSOFT Security

A passive defense is not enough to deter threats to your operations.  Combining your IT and Security teams; you are able to be on the offensive, closing vulnerabilities before they are exploited.

Onsoft address this via multiple tools covering different angles/views of a vulnerability, either via direct protection or behaviour analysis.

An other way of thinking about security in your organisation is the measurement of ACCEPTABLE RISK. Is the deployed technology (Computing Hardware, Software and network infrastructure) adding to the complexity of your environment, while creating the potential to to cause a catastrophic failure?


What is malware?

Also known via technical names like virus, bot, trojan, spyware, key logger, adware, and more.

What does malware do?

It is:

  • annoying and harmful to your servers and device endpoints (laptops, workstations and mobile devices);
  • get information about your system or your person;
  • placing code or re-configuring your system;
  • re-using your system for the illegal purpose to attack others.

What is ransomware?

It is malicious software designed to prevent access to a computer or data until a sum of money has been paid.

What does ransomware do?

  • two types of ransomware in circulation: Encryptors or Lockers;
  • they exploit vulnerabilities in the operating system or applications installed on computer;
  • after a vulnerability is exploited, personal data is encrypted/Os is locked and held ‘ransom’ until money been paid to release the encryption.
Threat Prevention

What is Threat Prevention?

Threat Prevention is more than just having an antivirus installed on your endpoint device.

What does a Threat Prevention solution do?

A Threat Prevention solution should have the following elements to ensure peace of mind:

  • firewall;
  • antivirus;
  • integrated patch management;
  • mobile device management;
  • malicious email protection;
  • infected website protection.
Endpoint Management

What is Endpoint Management?

Endpoints are also referred to as IT devices such as Servers, Workstations, Laptops, Tablets and Smart Phones. In the corporate environments; managing endpoints get more difficult by the day due to issues related compliance, policies, use of endpoint, endpoint protection and upgrading/removing of software.

Constant release of software patches on various products makes it difficult to centrally manage and report on your potential vulnerabilities. Investing and implementing an endpoint management solution in combination with your Service Desk gives you transparency where your devices are, what is installed and how it is used by the end-user.  Does the device add value to the operation, or is it consistently giving problems and being ‘duct-taped’ together just to barely keep going?

What should an Endpoint Management do?

An  Endpoint management solution should have the following attributes to ensure smooth IT Asset Operations:

  • Inventory – Device Manufacturer, Hardware, Software and Security configuration;
  • Application Deployment – Install/Remove software from multiple devices without being at device;
  • Operating System Deployment – Replace or install new Operating System over network;
  • Software License Management – Know the software installed v.s. Software purchased;
  • Device Patch Management – Are the devices installed protected/patched from known vulnerabilities;
  • Device Event Management – Monitor and report on certain ‘strange’ activities on devices;
  • Policy Compliance – Do devices meet corporate governance standards;
  • Remote Management – Remotely control and assist end-user customers.
Endpoint Behaviour/Knowledge Analytics

What is Real-time Endpoint Behaviour/Analytics and why should we care?

It is standard practice at larger organizations to conduct some form of periodic security compliance audit. The audit is either completed due to a requriement from external auditors, or internal Risk department wanting to know the status of the business operational risk. Regardless of which type of audit you are required to perform, it is generally best practice to use an independent tool to verify that your processes and systems are in compliance with established polices and regulations.

Audit Tools, assisting with End-user IT Analytics, allows you to define and monitor in real-time your compliance criteria across Windows, Mac OS and Mobile devices. The benefit to use a real-time analytic tool is that the audit captures all executions and all network connections being made by your endpoints and provides new visibility and insight into security compliance within your environment.

Proactively uncovering issues related to security and compliance ensures your your environment matches your acceptable risk profile.

What should an Endpoint Analytics tool do?

An Analytic audit solution should have the features and functionalities to assist with the following areas:

  • ITSM (IT Service Management)
    Helps IT departments find the gap between what is delivered and the challenges end-users (workers) face;
    Optimize IT operations and improve incident, problem and capacity management.
  • IT Governance
    Helps IT departments align with the business and prove that the IT infrastructure is delivering value;
    Measure the effectiveness of IT operations, support and security from the end-user (worker) perspective.
  • Security
    Helps IT departments prove that the security policies are working and provide another layer of risk and threat detection.
    Real-time detection of non-compliant and unusual activity, where you need it most, on end-user (worker) endpoints.
  • IT Transformation
    Helps IT departments measure the effects on end-users (workers) resulting from any change to the IT infrastructure.
    Provides a better way to plan, execute and measure the results of workplace transformation projects.
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Start typing and press Enter to search