SlideShare a Scribd company logo
© SecPod Technologies
Many Products, No Security
So many products: Organizations invest in multiple products, many with overlapping
capabilities. And investments are huge when considering the cost of products,
maintenance, professional services, training and vendor management.
Yet so little security: Ransomware and other malware exploits are always in the news.
Attackers exploit endpoints after penetrating perimeter and anti-virus protection.
Unpatched endpoints are insecure and easily compromised. Current results illustrate a
fundamental shortcoming in how security is being approached.
A platform-centric approach with applicable, effective tools
is needed to transform endpoint management and security.
Bring saneness to your endpoint security and systems
management with SanerNow, a cloud-delivered solution.
SanerNow…
Your Platform for Managing and Securing Systems
SanerNow’s “platform with an agent and apps” model addresses a sweeping range of
endpoint security and management challenges. It offers many apps, each addressing a
specific security scenario.
One platform, multiple use
cases: Simplify IT security and
management efforts to reduce
costs.
WHY SanerNow?
BENEFITS
 Single platform, multiple use
cases
 Simplify endpoint security and
systems management
 Reduce up to 60% of IT
product investment
 Deploy in minutes for
immediate results
FEATURES
 Continuous monitoring
 Self-healing
 Scans in less than 5 minutes
across thousands of endpoints
 Seamless scalability — scale
agents up or down as needed
 Architected for multi-tenancy,
role-based access
 Agents support Microsoft
Windows, Linux and Mac OS X
 High-performance, search
results in less than a second
SanerNow
Your platform for managing and securing endpoints
VULNERABILITY
MANAGEMENT
PATCH
MANAGEMENT
ASSET
MANAGEMENT
COMPLIANCE
MANAGEMENT
THREAT DETECTION
& RESPONSE
ENDPOINT
MANAGEMENT
© SecPod Technologies
Ancor Server
The ANCOR (Analytics and Correlation) server
houses vulnerability and threat intelligence,
information collected from endpoints, and
correlates the two to identify issues, risks and
threats. The Ancor server also helps manage
endpoint devices.
Viser Management Console
A web-based management console helps you
monitor and manage endpoints.
SanerNow Agent
A light-weight agent is installed on all endpoints
(Microsoft Windows, Linux and Mac OS X), it scans
endpoints, and interacts with servers to accomplish
tasks.
How does SanerNow Work?
SanerNow Queries and Monitors Endpoints, Analyzes the Security Posture, and
Responds to Bring Endpoints to an Approved State
SanerNow’s platform-centric approach is designed on the same principles as that of an
operating system. The core (‘kernel’) performs the analytical computations required to
detect aberrations and deviations. The ‘shell’ provides the ability to query, monitor and
make changes. The ‘user/application layer’ helps transform these computations to
support various use cases.
SanerNow is built with these four primary concepts:
• Query the system to get visibility
• Monitor for changes and aberrations as they occur
• Analyze the system for risks and threats
• Respond to fix the issues
SanerNow Deployment
A Single Platform for Comprehensive Endpoint Security and Systems Management
QUERY MONITOR ANALYSE RESPOND
ANCOR
SERVER
VISER
CONSOLE
SanerNow AGENTS
ENDPOINTS
(Windows, Linux, Mac)
APPLICATION
TOOLS
© SecPod Technologies
Compliance Management
 Achieve compliance to
regulatory standards
 PCI, HIPAA, NIST 800-171,
NIST 800-53
 Custom configuration
standards
 Fix compliance deviations
automatically to ensure that
your organization is
continuously compliant
Threat Detection & Response
 Detect Indicators of Attack
(IoA) and Indicators of
Compromise (IoC)
 Run queries to check for
abnormal behavior or
unusual network activity
that is symptomatic of an
attack
 Stop on-going attacks by
blocking applications, killing
processes, cleaning up
startup folders, etc.
SanerNow Use Cases
Empower Yourself to Take Proactive Action to Protect Against Threats
ABOUT SecPod
SecPod is an endpoint security and systems management technology company. Founded in 2008 and headquartered in Bangalore with operations in USA, SecPod
creates cutting edge products to manage and secure endpoints. © 2018 SecPod is a registered trademark of SecPod Technologies Pvt. Ltd.
Vulnerability Management
 Get continuous risk
assessment without
impacting system or
network resources
 Gain insight into the security
posture and align the
enterprise with the security
policies of the organization
 Automatically remediate
risks
Patch Management
 Identify and roll out patches
automatically
 Keep all major operating
systems (Windows, Linux
and Mac OS X) as well as
third-party applications up-
to-date
 Detect and fix configuration
deviations, such as password
polices and encryption
strength
Asset Management
 Track software and
hardware assets
 Track new installations and
changes to configuration
settings
 Manage and optimize
software licenses and costs
 Blacklist rogue applications
that show up in the
inventory
Endpoint Management
 Get visibility into the status
of endpoint systems, with
100s of built-in checks
 Gather network details and
map of devices
 Search for the presence of
sensitive data, such as credit
card information, social
security numbers, etc.
 Deploy software, block
applications and devices
Request a demo: info@secpod.com
INDIA
1354, 9th Cross, 33rd Main
JP Nagar, I Phase
Bangalore - 560078
Karnataka, India
Phone: +91 080 4121 4020
USA
303 Twin Dolphin Drive, 6th Floor
Redwood City, California, 94065
United States of America
Phone: +1 918 625 3023
Contact Us
Enquiry: info@secpod.com
Technical Support: support@secpod.com
Phone: +91 080 4121 4020

More Related Content

What's hot

Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Marco Morana
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
Symantec
 
Software Security Testing
Software Security TestingSoftware Security Testing
Software Security Testing
ankitmehta21
 

What's hot (20)

Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Top 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the ExpertTop 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the Expert
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
Software Security Testing
Software Security TestingSoftware Security Testing
Software Security Testing
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 

Similar to SanerNow platform-datasheet

David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
Andrew Kanikuru
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
amiable_indian
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
Invincea, Inc.
 

Similar to SanerNow platform-datasheet (20)

David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
SecOps.pdf
SecOps.pdfSecOps.pdf
SecOps.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
 
Security Process in DevSecOps
Security Process in DevSecOpsSecurity Process in DevSecOps
Security Process in DevSecOps
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
Top Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdfTop Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdf
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0
 
SanerNow Vulnerability Management
SanerNow Vulnerability ManagementSanerNow Vulnerability Management
SanerNow Vulnerability Management
 

More from SecPod Technologies

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 

More from SecPod Technologies (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Security threats
Security threatsSecurity threats
Security threats
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
WHY MSSPs LOVE OUR SOLUTION
WHY MSSPs LOVE OUR SOLUTIONWHY MSSPs LOVE OUR SOLUTION
WHY MSSPs LOVE OUR SOLUTION
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
 
SanerNow Asset Management
SanerNow Asset ManagementSanerNow Asset Management
SanerNow Asset Management
 
Many products-no-security
Many products-no-securityMany products-no-security
Many products-no-security
 
Healthcare's Fight Against Ransomware
Healthcare's Fight Against Ransomware Healthcare's Fight Against Ransomware
Healthcare's Fight Against Ransomware
 
Msp saner 2.0
Msp saner 2.0Msp saner 2.0
Msp saner 2.0
 
Saner 2.0
Saner 2.0Saner 2.0
Saner 2.0
 
Saner 2.0 product sheet
Saner 2.0   product sheetSaner 2.0   product sheet
Saner 2.0 product sheet
 
Ransomware - A look back
Ransomware - A look backRansomware - A look back
Ransomware - A look back
 
End point security - SecPod Saner
End point security - SecPod SanerEnd point security - SecPod Saner
End point security - SecPod Saner
 
Worst security data breaches till 2015 - SecPod
Worst security data breaches till 2015 - SecPodWorst security data breaches till 2015 - SecPod
Worst security data breaches till 2015 - SecPod
 
Our talk in Black Hat Asia 2015 Briefing
Our talk in Black Hat Asia 2015 Briefing Our talk in Black Hat Asia 2015 Briefing
Our talk in Black Hat Asia 2015 Briefing
 
Changing L andscape Of Cyber Attacks
Changing L andscape Of Cyber AttacksChanging L andscape Of Cyber Attacks
Changing L andscape Of Cyber Attacks
 
Cost Of Cyber Crime
Cost Of Cyber CrimeCost Of Cyber Crime
Cost Of Cyber Crime
 
Perception vs reality of cyber security
Perception vs reality of cyber securityPerception vs reality of cyber security
Perception vs reality of cyber security
 
Top Vulnerabilities Of 2014
Top Vulnerabilities Of 2014Top Vulnerabilities Of 2014
Top Vulnerabilities Of 2014
 

Recently uploaded

Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 

Recently uploaded (20)

A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 

SanerNow platform-datasheet

  • 1. © SecPod Technologies Many Products, No Security So many products: Organizations invest in multiple products, many with overlapping capabilities. And investments are huge when considering the cost of products, maintenance, professional services, training and vendor management. Yet so little security: Ransomware and other malware exploits are always in the news. Attackers exploit endpoints after penetrating perimeter and anti-virus protection. Unpatched endpoints are insecure and easily compromised. Current results illustrate a fundamental shortcoming in how security is being approached. A platform-centric approach with applicable, effective tools is needed to transform endpoint management and security. Bring saneness to your endpoint security and systems management with SanerNow, a cloud-delivered solution. SanerNow… Your Platform for Managing and Securing Systems SanerNow’s “platform with an agent and apps” model addresses a sweeping range of endpoint security and management challenges. It offers many apps, each addressing a specific security scenario. One platform, multiple use cases: Simplify IT security and management efforts to reduce costs. WHY SanerNow? BENEFITS  Single platform, multiple use cases  Simplify endpoint security and systems management  Reduce up to 60% of IT product investment  Deploy in minutes for immediate results FEATURES  Continuous monitoring  Self-healing  Scans in less than 5 minutes across thousands of endpoints  Seamless scalability — scale agents up or down as needed  Architected for multi-tenancy, role-based access  Agents support Microsoft Windows, Linux and Mac OS X  High-performance, search results in less than a second SanerNow Your platform for managing and securing endpoints VULNERABILITY MANAGEMENT PATCH MANAGEMENT ASSET MANAGEMENT COMPLIANCE MANAGEMENT THREAT DETECTION & RESPONSE ENDPOINT MANAGEMENT
  • 2. © SecPod Technologies Ancor Server The ANCOR (Analytics and Correlation) server houses vulnerability and threat intelligence, information collected from endpoints, and correlates the two to identify issues, risks and threats. The Ancor server also helps manage endpoint devices. Viser Management Console A web-based management console helps you monitor and manage endpoints. SanerNow Agent A light-weight agent is installed on all endpoints (Microsoft Windows, Linux and Mac OS X), it scans endpoints, and interacts with servers to accomplish tasks. How does SanerNow Work? SanerNow Queries and Monitors Endpoints, Analyzes the Security Posture, and Responds to Bring Endpoints to an Approved State SanerNow’s platform-centric approach is designed on the same principles as that of an operating system. The core (‘kernel’) performs the analytical computations required to detect aberrations and deviations. The ‘shell’ provides the ability to query, monitor and make changes. The ‘user/application layer’ helps transform these computations to support various use cases. SanerNow is built with these four primary concepts: • Query the system to get visibility • Monitor for changes and aberrations as they occur • Analyze the system for risks and threats • Respond to fix the issues SanerNow Deployment A Single Platform for Comprehensive Endpoint Security and Systems Management QUERY MONITOR ANALYSE RESPOND ANCOR SERVER VISER CONSOLE SanerNow AGENTS ENDPOINTS (Windows, Linux, Mac) APPLICATION TOOLS
  • 3. © SecPod Technologies Compliance Management  Achieve compliance to regulatory standards  PCI, HIPAA, NIST 800-171, NIST 800-53  Custom configuration standards  Fix compliance deviations automatically to ensure that your organization is continuously compliant Threat Detection & Response  Detect Indicators of Attack (IoA) and Indicators of Compromise (IoC)  Run queries to check for abnormal behavior or unusual network activity that is symptomatic of an attack  Stop on-going attacks by blocking applications, killing processes, cleaning up startup folders, etc. SanerNow Use Cases Empower Yourself to Take Proactive Action to Protect Against Threats ABOUT SecPod SecPod is an endpoint security and systems management technology company. Founded in 2008 and headquartered in Bangalore with operations in USA, SecPod creates cutting edge products to manage and secure endpoints. © 2018 SecPod is a registered trademark of SecPod Technologies Pvt. Ltd. Vulnerability Management  Get continuous risk assessment without impacting system or network resources  Gain insight into the security posture and align the enterprise with the security policies of the organization  Automatically remediate risks Patch Management  Identify and roll out patches automatically  Keep all major operating systems (Windows, Linux and Mac OS X) as well as third-party applications up- to-date  Detect and fix configuration deviations, such as password polices and encryption strength Asset Management  Track software and hardware assets  Track new installations and changes to configuration settings  Manage and optimize software licenses and costs  Blacklist rogue applications that show up in the inventory Endpoint Management  Get visibility into the status of endpoint systems, with 100s of built-in checks  Gather network details and map of devices  Search for the presence of sensitive data, such as credit card information, social security numbers, etc.  Deploy software, block applications and devices Request a demo: info@secpod.com INDIA 1354, 9th Cross, 33rd Main JP Nagar, I Phase Bangalore - 560078 Karnataka, India Phone: +91 080 4121 4020 USA 303 Twin Dolphin Drive, 6th Floor Redwood City, California, 94065 United States of America Phone: +1 918 625 3023 Contact Us Enquiry: info@secpod.com Technical Support: support@secpod.com Phone: +91 080 4121 4020