808.951.5914
Secure Technology Hawaii, Inc.
  • P1
  • Services
  • Host/Cloud/MSP
    • Private Cloud Hosting
    • Public Cloud Integration
    • Managed Security Services
    • Managed Backup|Recovery
    • Managed Monitor|Alerting
  • Products
    • Security
    • Storage
    • Networking
    • Backup|Recover|Replicate|Orchestrate
  • Labs
  • Events
  • About
  • Find

Security Products - Leading way in Hawaii since 1995!

Secure Technology Hawaii offers best of breed security products to our customers.  In most cases, we have several years of experience in the specification, design, deployment and support of each.  Many of these products are also used as part of our managed security services as well.

FW/ | VPN/ | XDR | Cloud |
Zero Trust | Monitoring
​

Picture

​We started selling Check Point in 1996 as one of the nation's first 50 VARs.  With over 88 man-years of real-world experience, we have deployed over 800 Check Point solutions throughout Hawaii, CONUS and the Pacific Rim. STHI deploys Check Point products on custom- built hardware, on Check Point appliances and in VMware.  We also offer Full Stack Managed XDR Solutions from Chcckpoint linking firewall and Endpoint protections to a single monitored solutions.

​


Web/Email Sec/Casb/DLP

Picture

We started selling Forcepoint in 1997 as one of the first URL filters on the market.  Well, Forcepoint has come a long way with their web content security and we can use their Triton Suite of products to provide email security, browsing security, email encryption, and complete data loss prevention and employee monitoring solutions from a single integrated solution. as well as many other new ForcePoint products

Email Sec/Casb/DLP
​

Picture

​Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help organizations protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data governance mandates that have been spawned from highly publicized data breaches.  STHI has been selling and supporting ProofPoint email solutions in Hawaii for over 13 years.
​

Endpoint Threat Detection, Prevention & Response

Picture
Regardless of how advanced your defenses are, there’s a chance that attackers will do an “end run” on your security solution and slip through to gain access to your environment. Conventional defenses don’t know and can’t see when this happens, resulting in “silent failure.” When silent failure occurs, it can allow attackers to dwell in your environment for days, weeks or even months without raising an alarm. The solution lies in continuous and comprehensive visibility into what is happening on your endpoints in real time.
CrowdStrike Falcon Insight eliminates silent failure by providing the highest level of real-time monitoring capabilities that span across detection, response and forensics to ensure nothing is missed, leaving attackers with no place to hide. Falcon Insight provides organizations with state-of-the-art endpoint detection and response (EDR), following an approach recommended by top analyst firms such as Gartner.

Managed EDR/XDR
w/ Identity Threat Prevention

Picture
Using the industry leading Falcon platform from Crowdstrike with their COMPLETE monitoring solution provide fully manged and monitored endpoint solutions from a single vendor per  SLA for each customer.  Playbooks are tuned and documented.

IWe have also added in Crowdstrike's Identity Thread Prevention to the solution to provide visibility into Active Directory and more identity based threats.  With Crowdstrike Spotlight, we also provide visibility into the effectiveness of the customers patch management solution as well showing validated vulnerabilities on the endpoint

Please reach out to STHI to learn more about Crowdstrike Managed EDR/XDR solutions






Hosted WAF / DDOS

Picture
Cloudflare Security Services protect and secure websites, applications and APIs against denial-of-service attacks, customer data compromise, and abusive bots through their advanced CDN and hosted WAF and SSL Services.  Cloudflare can automatically filter out illegitimate traffic targeting the application layer through web application firewall (WAF) rulesets, including GET and POST-based HTTP requests. Enable pre-built rulesets such as OWASP Top 10 and Cloudflare application-specific. Build rulesets to specify types of traffic to block, challenge, or let through. Additionally, fast SSL / TLS encryption at the edge of Cloudflare’s network, automated certificate management, and support for the latest security standards.

STHI offers Cloudflare solutions as an extension of our cloud integration services to product customers application systems both on premises and in the cloud.


Strong Authentication / MFA

Picture
Duo's wide variety of authentication methods make it easy for every user to securely and quickly log in. Duo Push, sent by the Duo Mobileauthentication app, allows users to approve push notifications to verify their identity. Duo also supports Universal 2nd Factor (U2F) security tokens, hardware tokens, mobile passcodes, and biometrics like Touch ID to provide flexible and accessible options for all types of users - from clinicians to third-party contractors


Strong Authentication / MFA

Picture
How do you ensure that only legitimate users have access to your Network or VPN?   Trade in your weak, vulnerable password systems for the proven, reliable security of RSA SecurID authentication. 

STHI been a certified premier level reseller of RSA Security (Security Dynamics) products for over 25 years with numerous installations throughout the State. Our clients have used these systems to securely connect to their Hawaii systems from locations around the world.

API Security

Picture
Are you using API's to integrate your cloud and prem applications?  Do you have security visibility? Using SALT Security , STHI delivers the adaptive intelligence you need to protect your APIs across build, deploy, and runtime phases. We catalog all your APIs, stop attackers during the early stages of an attempted attack, and share insights to improve your API security posture.

Security Ops / Managed Detection & Response

Picture

IT and security teams are really stretched thin, and most common security tools slow down
progress instead of helping them get ahead. The Adlumin Security Operations Platform plus extended risk management is built to help any organization take command of its security and compliance.
Adlumin streamlines data ingestion, analysis, and compliance workflows throughout your enterprise — illuminating unseen cyber threats, system vulnerabilities, and IT operations, so your path to response and compliance becomes clear.


Privileged Access
Management

Picture
The CyberArk Core Privileged Access Security Solution provides organizations with the ability to take a risk-based approach to credential and session management. Enforce least privilege principles and lock down domain controllers to defend against both internal and advanced persistent threats.


Patch Management

Picture
Many organizations juggle separate tools to patch physical and virtual servers—taking on the extra time and resources and increased risk of human error that entails. Others largely ignore the virtual environment—taking on a great deal of risk.  We have a better way: a single automated solution that spans not only physical and virtual servers but workstations as well. Ivanti Patch for Windows patches everything from the Windows OS to hypervisors to third-party apps.

Content Collaboration

Picture

Empower teams, minimize disruption and reduce the risk of private data being accessed (or shared) with consumer-grade apps. Egnyte integrates seamlessly with popular applications, enabling a smooth adoption for both internal and remote users; while always ensuring valuable files remain protected.  Egnyte delivers a comprehensive approach to security that offers complete control wherever files are stored.
​



Copyright 2024 - Secure Technology Hawaii, Inc.