CryptoComply is a family of standards-based “Drop-in Compliance” cryptographic engines designed for use in servers, workstations, Cloud, appliances, and mobile devices. SafeLogic’s containers deliver core cryptographic functions to these platforms and feature robust algorithm support, including Suite B algorithms. CryptoComply modules offload secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. As a FIPS 140-2 validated module, CryptoComply can be deployed quickly to meet various needs and requirements.
Effortless Patching and Installation
Automate your patch management to save time and resources. Heimdal CORP installs software and keeps it up to date, according to your specific needs and settings. Block 85% of web attack angles… with zero setup and no user interruptions. In-depth reporting on vulnerabilities and updates included. Works anywhere in the world.
Bird's Eye Threat Management
Spot and mitigate infection risks, supervise how quickly your vulnerabilities are being removed and find malware through communication patterns - all in one Unified Threat Dashboard (UTD). Doing compliance and working with the EU DPA is also possible in the UTD.
Heimdal supplements your endpoints’ security by filling the gaps left uncovered by inadequate antivirus reaction. Build up your defenses against unknown, polymorphic malware with dormant capabilities. Heimdal helps you reduce your response time to malware compromise with automated email alerts. Engineered to help you spot and mitigate infection risks before they turn into network-wide infections.
Deploy fast, at any scale and stay nimble
As a lightweight client, you can easily deploy Heimdal on all your endpoints, via MSI, no matter the size of your organization. Doesn’t impact your endpoints’ performance and Internet speed. Heimdal doesn’t rely on large signatures or definitions and keeps your endpoints nimble and effective. Works anywhere in the world, not just in the Active Directory.
Integrate seamlessly, manage easily
No matter what other security solutions you may be using, we guarantee that Heimdal will work smoothly with them, without causing conflicts. Your Heimdal dashboard makes it simple and time-effective for you to set up and manage your organization’s protection. Spot vulnerable endpoints and take action to keep malware infections at bay. Ensure continued compliance with legal requirements. Always know the state of security in your organizations.
Secure Access, Everywhere
The Heimdal CORP platform uses a login process based on 3-factor authentication and is powered by a cloud-based, always on infrastructure. This platform is geo-replicated and load balanced, with SSD drives for ultra-quick response times and zero service delay.
Fiercely protect your endpoints against ransomware
Proactive protection is what you need to stop ransomware from encrypting your endpoints. Heimdal closes vulnerabilities and sanitizes your Internet traffic to stop ransomware from infecting your endpoints. Based on extensive knowledge of cyber criminal infrastructure, Heimdal detects and blocks malware distribution websites, exploit kits, ransomware payloads, encryption keys and C&C communication. Effective 24/7, anywhere in the world.
Prevent data leakage and enhance your uptime
Heimdal CORP prevents data breaches by blocking communication between malware and its C&C servers. By analyzing all HTTP, HTTPS and DNS traffic, Heimdal stops malware from harvesting confidential data from your endpoints. Effective against phishing, whaling, botnets, financial malware and other malicious software with data exfiltration capabilities. Ensures legal compliance with data protection standards. Reduces downtime and provides a safeguard for business continuity.
Heimdal CORP works in 3 ways, powered by its powerful engines:
Supplement for Antivirus, which is reactive
Antivirus looks for files and actions, whereas Heimdal looks at Internet traffic. Therefore, what Heimdal covers and antivirus products cover varies greatly. Heimdal prevents cyber criminals from taking data from your workstations and moving it out of your network.
Traffic scanning to block malicious traffic
Dangerous Internet traffic can be used to infect your workstations and network. This makes scanning and blocking malicious web traffic a core security component. Heimdal protects your workstations against cyber attacks and infected servers, domains and websites, while also ensuring a safeguard against data leakage.
Patches 99.5% of security-critical software
Heimdal patches Java 7 / 8, Acrobat Reader, Acrobat Flash, Quicktime, VLC Player, Silverlight and many other applications, covering 99% of security-critical software apps. Heimdal works automatically and silently, without interrupting the user.
Heimdal’s patch & install engine – key benefits
- Automatic deployment/redeployment of patches
- Silent software installation
- Silent patching without user interruption
- Works anywhere in the world, not just in the AD
- Covers both feature and security patches
- Patch release to install time of less the 4 hours on avg.
- Integrates with the Active Directory without any setup
- Configurable – install and patch specific software
- Version management included
- Easy deployment via MSI
Heimdal CORP provides proactive protection against:
- Data leakage
- Financial fraud and financial malware
- Vulnerabilities caused by outdated software
- Zero Day Malware
- Data Leakage & Data Theft
- Phishing, Pharming, Whaling
- Exploit Kits
- Malware Distribution Vectors (C&Cs, websites, etc.)
- Fileless Malware
- Malicious Traffic Redirects
- Adware & Spyware
- Browser hijacking
- DNS hijacking
- Drive-by Attacks
- Macro Viruses
- Document Malware
- URL Injection
- Targeted Threats
- SQL Injection
- Remote Access Trojans
- Polymorphic Malware
- IP Spoofing
- Form-grabbing Malware
- Email Malware Distribution
- Dormant malware
- Potentially unwanted programs (PUPs)
You can install Heimdal on computers running the following operating systems:
- Windows 10 (32 and 64 bit)
- Windows 8.1 (32 and 64 bit)
- Windows 8 (32 and 64 bit)
- Windows 7 (32 and 64 bit)
- XENAPP 7.6 or above
- XENSERVER 6.5
- WINDOWS SERVER 2008-2012
Heimdal has the following system requirements:
- Microsoft .NET Framework 4.6.1*
- 100 MB disk space
- 250 MB RAM
- 3% of CPU usage
- Local administrator or domain administrator (if in domain) rights during installations
- User rights during execution
- Internet access
*if .NET Framework 4.6.1 Full Profile is not already installed, Heimdal will automatically download and install it. This does not apply to the MSI based installation.
BitNinja is an easy-to-use server security tool, which can be installed on your server within a couple of minutes and requires virtually no maintenance, a mixture of an on-premise and cloud based solution.
It is an agent which sits on your infrastructure and sends the attack information to the central server which is in the cloud.
We have a new technology called the defense network, which means that every BitNinja protected server learns from each attack and shares the learned information with the central server and with all the other BitNinja enabled servers, so the shield just gets stronger and stronger with every single attack.
No FAQs associated with this application.
No FAQs associated with this application.
Does this service offer multi-user capability (e.g. teams)?
What platforms does this service support?
Yes, you can add/invite new members to your account on the Dashboard/Users menu using the List/Add Users button. You can set 4 predefined roles to each user, depending on the level of access you want to grant. Now you can choose between Admin, Server Operator, Server Group Operator or Invoice/Accounting Manager, but later on, we plan to add new roles with more defined access points.
What is this service generally used for?
BitNinja supports every Linux distributions. We design packages for .apt and .rpm based Linux systems and do automatic testing for the following distributions:
Debian6 32/64 bit, Debian7 32/64 bit, Debian 8 32/64bit, Ubuntu 12 32/64 bit, CentOS6 32/64 bit, CloudLinux 6, CentOS 5, CentOS 7, CloudLinux 5, CloudLinux 7, RedHatEnterpriseServer 5, RedHat 6 and up, Ubuntu 10, Ubuntu 13 and up
Does this service offer an API?
It's a server security system, which instead of dealing with security threats separately, has a holistic approach to it.
We provide different modules to the different aspects of server security, so 360° defense is granted by our modular solution:
With the power of collective intelligence, your server becomes more protected every second, as we sync attack information among all the BitNinja protected servers worldwide.
Moreover, while cloud-based security solutions require your traffic to be redirected through their servers, with BitNinja, you don’t have to do any configuration. Also, any failures of the cloud-based party can make your server unavailable, which is a huge risk to take. Our service runs on your own existing infrastructure, so there is no downtime if anything stops running in our system.
BitNinja directly protects not only on HTTP, but all other protocols (SMTP, IMAP, POP3, SSH, FTP) as well.
Who are the main user groups of this service?
We have a reseller API.
Does this service offer guides, tutorials and or customer support?
BitNinja is primarily designed for the needs of hosting providers. However, it is also a perfect choice for any VPS, colocation and SaaS provider, website developer, digital agency and any other company that runs their own servers and wants to keep them safe on the Internet.
Yes, we provide comprehensive support for our partners (having Pro or Free license), including technical support for incident management, configuration or threat management.