The core of Helios TM is its enterprise communications architecture which enables you to manage thousands of systems in multiple locations from one single dashboard.
The communications in Helios TM have been developed with the Microsoft’s .Net 3.0 Windows Communication Foundation (WCF). The technology in WCF ensures that Helios TM has a reliable, efficient & highly secure communications foundation. All Helios communications are encrypted and authenticated by using X.509 digital certificates and PKI (Public Key Infrastructure).
Deploying an enterprise level product over multiple network segments usually requires a large amount of configuration on routers and firewalls, multiple ports have to be opened and access lists have to be applied. Helios TM solves this problem by using a completely connect-back architecture that minimizes network configuration & works through very restrictive firewalls. This is extremely useful when Helios TM is deployed on partner systems or third-party networks.
One of the modules in Helios TM ESMS is the regulatory compliance module. You can use this module to verify whether the security settings on all your endpoints are compliant against regulatory compliance standards, or your own organization’s security policy.
The system comes pre-configured with compliance templates for standards such as ISO-27001, PCI/DSS, NIST 800-53 and templates of best practices. It is extremely simple to create your own templates based on the security policies that you are using.
You can select the systems you wish to audit against the template and view detailed analyses, graphs and report information.
The level of granularity in the reports ranges from executive style over-views, right down to the actual configuration of each system that an implementer would require.
Helios TM has been designed to perform audits blazingly fast. The agents all operate in parallel, which means that it takes roughly the same amount of time to audit five systems as it will to audit five hundred. Scaling the system up to work at multiple geographical sites is as simple as deploying agents & one more aggregator to connect to the main console.
By making the console web-enabled, we’ve allowed you to perform your audits, access your reports, and view the status of your organization’s compliance from anywhere you can find a web-browser.
The Helios dashboard is the first view that greets you when you log into the web console. The dashboard provides you with an ‘at-a-glance’ view of the state of your compliance. The historical graph instantly conveys whether the level of compliance is rising or falling.
Simple Task Creation
The ‘Create Task’ tab is the heart of the application; from here you can see all the endpoints connected to the system. Select them & choose a template to begin auditing.
Templates for Everything
Helios TM comes with a set of ready templates that cover major regulatory compliances such as ISO-27001, NIST 800-53 and PCI/DSS as well as our own best practices. Should these not suffice, you can easily edit them, or create a template to match your own policies.
Speed and Accuracy
Helios TM doesn’t care how many systems you want to audit. It returns results from across departments and geographical locations in the same time it takes to scan a local network. All through, it ensures completely automated accuracy, regardless of how many over-lapping security policies are applied.
Built for you
We believe that the most important feature of Helios TM is the degree of customizability it offers.
Virtually every part of the product can be tweaked, tuned and optimized to suit your organization. If there is a feature that you believe is missing, we can build it for you.
Note that this extends far beyond the Helios Compliance module; we designed Helios TM as an architecture to manage any form of security on your endpoints. If there’s a security task to be automated, talk to us and we’ll show you how Helios TM can do it!
Copyright@2012 MIEL e-Security Pvt Ltd I All rights reserved I Site Map
Designed by Design Accent