CRYPTTECH is a leading R&D company, and a leader in the field of IT Security. Established in 2006, CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs, deriving actionable Security Regulations and Compliance Solutions and Big Data.

CryptoLOG

Product overview

Every application, OS, or device on a network generates records and logs, carrying valuable information that can be used for ensuring reliability and security over total network structure; however, the fact that logs are generated in massive volumes – as well rapid evolution of cyber-attacks in today’s IT business world – greatly emphasizes the importance that an integrated log management system plays in every organization’s IT structure to monitor availability of connections, performance of applications and security threats. CRYPTOLOG is a log manager that collects, normalizes, and categorizes massive logs generated across your network and turn it into valuable information on an intuitive interface where advance search, analysis and correlation monitoring becomes easier and more efficient.

Key features and advantages

Global Log collection and categorization

CRYPTOLOG overcomes lack of consistency on log formats, and provides logging and storage of a broad range of log workspaces, e.g. OS events, IDS events, application log files, Database transactions and so forth, using potent collecting engines and parsing algorithms. The original log records can be stored separately based on vendor request for lateral archiving or legal regulation purposes.

Full visibility into network activities and vulnerabilities over an intuitive user interface

Real-time network events can be monitored over the powerful yet easy-to-understand user interface of CRYPTOLOG, where no specific knowledge on log-files infrastructure is necessary. Customizable dashboard provides the administrator with simplified drill down analysis over intuitive graphs and charts.

Ensuring compliances and retention regulation as well as internal policies

CRYPTOLOG ensures well-known mandates such as PCI DSS, HIPAA, SOX, etc. and retention regulations with built-in statistical or graphical reports, customized reports, through alerts and flexible storage options.

Through incident forensics analysis over more than one year old logs data

Applying normalization and categorization on collected logs, CRYPTOLOG provides advanced query and full text search over logs, where cause or source of a breach can be found. Reports based on such queries can be used as legal evidence with confidentiality that Hashed and Time-Stamped Logs provides. CRYPTOLOG also goes one step further by auditing the auditors’ activities and ensures their authentication by sending the logs of CRYPTOLOG to another party for further investigation.

Scalability in accordance with IT structure size and demands

CRYPTOLOG’s architecture and configurations are adaptable to the scale of any organization. It can be applied through a cloud base virtual appliance that remotely collects and analyzes the logs for small scale networks to a single unit software, or using a centralized base with distributed sensors in large scale IT structures.

CryptoSIM

CRYPTOSIM is a SIEM software with exceptional correlation and analysis features, serving as a detection and controlling platform that can be integrated with CRYPTOLOG log manager, to provide organizations with threat detection and security risk evaluation on network behavior and performance.Although log managers collect and visualize the flowsacross the network in one centralized interface, they usually provide basic contextual information on the events. Without a proper correlation engine to correlate streams of events within a specific time, effective identification and responding to breaches is not possible. Logs vary based on their source and operating system. That means, a firewall log may contain totally different information in comparison to the logs of the same event from other applications. With several advanced correlation rules, CRYPTOSIM not only recognizes similar patterns of attacks among shreds of million of event file, but also detects policy violations and validates the IDS and firewalls efficiency.

Key features and advantages

Network security intelligence

CRYPTOSIM correlates logs from different sources and by investigating logs,flows and roles deliversintelligence over the entire IT network from threat detection and prioritization, to tracking breach path. With combining correlation results over collected logs, this SIEM product provides a reliable intelligence on user activities and security perception of the network.

Risk evaluation, prioritizing incidents

CRYPTOSIM correlates events from disparate parts and applications of the network in a highly efficient manner using a variety of methods from signature based anomaly detection and built-in attack patterns to behavioral inspection. Suspected Incidents are then prioritized based on the correlations that lead to a more accurate risk evaluation and efficient incident response.

Effective incident management

CRYPTOSIM provides administrators with information over the entire network in an all-in-one platform that contributes to prompt responses against breaches; however, investigating and answering each false positive costs organizations a great deal of time and effort. CRYPTOSIM reduces false positive alerts of the security system and consequently prevents organization from dedicating unnecessary resources on resolving such alerts. Further to detection, it provides instant alerts and commanding line capabilities to the administrator to respond in accordance to the detected incident

UnitMON

Overview

UNITMON –Unified IT Monitoring- is a robust monitoring solution, which can meet the needs of organizations in identifying critical shortcomings or failures on their IT infrastructure prior to any serious damage by monitoring the critical points of network. UNITMON provides you with complete visibility over your website, servers and applications –regardless of time and your location- through a web-based system and ability to view through a single view dashboard.

Key features and advantages

Vulnerability tracking and Analysis

UNITMON offers the best Preventative Security Solutions by scanning vulnerabilities through network devices, servers, and applications based on known vulnerabilities, to produce customizable vulnerability assessment reports that offer solutions to close exposures. Centralized, Preventative Vulnerability Management is a chief feature of UNITMON. UNITMON controls domain names for fake ones and helps you to take the necessary precautions or actions against Phishing and DNS spoofing attacks. The IP blacklist monitoring feature of UNITMON detects the suspicious IPs by checking your pre-defined IP black list and sends required alarms.

Content Monitoring Management

Content control features monitor all aspects of a website which are prone to hacking. Contents and images are controlled every minute and UNITMON sends alerts in case of any change, minimizing the loss of reputation. Furthermore, it provides extra cautions on content changes by checking hack-reporting sites such as zone-h.org. UNITMON facilitates regular expression to create complex pattern matches and controls all features and keywords of your site.

Network Monitoring Management

UNITMON enables administrators to monitor almost all network devices in IT infrastructures through an easy-to-use web-based dashboard, visualizing performances with advanced graphs. Such prompt and intuitive interface – which utilizes the Cloud Server – not only ensures the health and performance of network devices, it also makes efficiency resource Utilization and cost and risk minimization straightforward. UNITMON monitors CPU usage, memory and RAM, disk space and thresholds, and the availability and performance of servers. Operating System Monitoring (Win, Linux or UNIX) is one of the other features of UNITMON.

Reporting, Alerts and Notifications

Historical records of the availability and performance of servers and web pages play an increasingly important role in detection of defects, and in efficiency planning. Notifications and Alerts can be sent through E-mail or SMS based on users’ preferences. UNITMON provides a wide variety of reporting features to cover all the necessary needs of IT managers for security and control purposes. Furthermore, UNITMON offers a detailed report on its performance and interruptions.

CryptoSPOT

Product overview

CRYPTOSPOT is an Internet access gateway software which offers advanced features ideal for any company with any IT network size, to share an internet connection between multiple users in a secure and controlled environment. This hotspot management system uses an admin tool to authorize and control the users’ access to Internet with certain speeds and limits. Upon connecting to the network, each user should gain authorization through a captive portal/log-in screen on their browsers. The flexible structure of CRYPTOSPOT makes it an amiable Internet access gateway for organizations in any scale, from small cafés to large shopping centers, or airports.

Key features and advantages

Reliable and secure Internet access for all your guests and customers.

With a one-in-all web based simple admin tool interface, CRYPTOSPOT allows you to authenticate each and every user trying to access your network, define or delete any connection settings, and consequently provide a reliable and secure IT environment for both users and organizations.

CRYPTOSPOT offers cost-effective deployment without any hardware dependence, as well as an

easy-to-install and intuitive user interface of CRYPTOSPOT enables administrators to control clients access through any wireless device without any software installation requirement on the client’s part or any dependence on their’s or their administrator’s operating system.

Versatile authentication methods

CRYPTOSPOT offers a variety of authentication methods for rendering access to users from standard users, to SMS gateways, to RADIUS integration.

Universal control over number of users and per-user bandwidth quotas on the entire network

The number of users and their download-upload rates can be configured from unlimited to limited values by restricting speed or data caps. Data transmission limitations can be defined on upload and download separately on username or MAC address basis.

Customizable network configuration

You can define different configurations of access and bandwidth for disparate locations or specific users over your network. It also supports organization to allocate specific quotas and different log-in themes in certain locations.

Comprehensive reports on users’ accounts

Out-of-the-box report templates of CRYPTOSPOT, offers important information on activities of clients over the network. Total usage bandwidth and time, number of logins and top customers on time and download data are some of the statistics that the organizations can benefit from reports. Furthermore, government regulations may require log storage and management which is easily met by CRYPTOSPOT flexible storage options.

Advertising Benefits

Offering free high-speed access to Internet, not only attracts people and entice them for longer stays, it also provides a suitable platform for advertising the organization or generating advertising revenues. CRYPTOSPOT enables administrator to configure specific logos and layouts to be displayed on customers or guests browsers. Furthermore, the general themes and graphics of log-in page can be designed manually. The log-in methods usually gathers costumers and guests names and email addresses which can be used to send welcome or advertising messages via Video/Image banners. Survey is also another efficient feature to evaluate product and/or service quality.

Statistical Reports and Log Management

Out-of-the-box report templates of CRYPTOSPOT, offers important information on activities over the network. Total usage bandwidth and time, number of logins and top customers on time and download data are some of the statistics that the organizations can benefit from. Furthermore, generated logs in CRYPTOSPOT carries all the information on the activities and IP addresses of users. Some government regulations requires log storage and management. From analysis these logs CRYPTOSPOT offers variety of reports;
◾Top N Daily/Weekly/Monthly Authenticated Users
◾Top N Daily/Weekly/Monthly Downloads
◾Top N Daily/Weekly/Monthly Uploads
◾Top N Daily/Weekly/Monthly Accessed Domains
◾Top N Daily/Weekly/Monthly MAC Addresses
◾Top N Daily/Weekly/Monthly Source IP Addresses
◾Quota Usage Timeline within N Hours/Days
◾Session Usage Timeline within N Hours/Days
◾Top N SMS Request senders
◾Current Distinct User Numbers
◾Daily/Weekly/Monthly Maximum Online User Counts
◾Internet Usage Hourly Distributions

Scalable Structure

Based on the requirements and structure of organization’s network, CRYPTOSPOT can be implemented on one central server or over a cluster server architecture. Total customers’ access to resources, policy enforcements and usage auditing can be controlled over one Authentication, Authorization and Accounting (AAA) server with CRYPTOSPOT, where each access point should be configured to transfers information to the central server. This service can cover bandwidth control and log auditing per user. CRYPTOSPOT uses RADIUS protocol where only AAA is required. However, in large networks where quota control and log auditing is important, CRYPTOSPOT can be installed multiple access point servers and these servers work in cluster, providing reliability, load balancing and scalability in CRYPTOSPOT’s overall service.

Customized Captive Portals, Reponsive Design in Multilanguage

CRYPTOSPOT provides responsive captive portals that are compliant with mobile, tablet and web. Login profile scan be presented for different hotspot services with various languages. Portal pages are automaticaly loaded on English, German, Turkish, Spanish, French, Italian, Russian, Arabic or Chinese according to browser language setting.