Security Products - Leading way in Hawaii since 1995!
Secure Technology Hawaii offers best of breed security products to our customers. In most cases, we have several years of experience in the specification, design, deployment and support of each. Many of these products are also used as part of our managed security services as well.
FW/ | VPN/ | XDR | Cloud |
|
Web/Email Sec/Casb/DLP
We started selling Forcepoint in 1997 as one of the first URL filters on the market. Well, Forcepoint has come a long way with their web content security and we can use their Triton Suite of products to provide email security, browsing security, email encryption, and complete data loss prevention and employee monitoring solutions from a single integrated solution. as well as many other new ForcePoint products |
Email Sec/Casb/DLP
|
Endpoint Threat Detection, Prevention & Response
Regardless of how advanced your defenses are, there’s a chance that attackers will do an “end run” on your security solution and slip through to gain access to your environment. Conventional defenses don’t know and can’t see when this happens, resulting in “silent failure.” When silent failure occurs, it can allow attackers to dwell in your environment for days, weeks or even months without raising an alarm. The solution lies in continuous and comprehensive visibility into what is happening on your endpoints in real time.
CrowdStrike Falcon Insight eliminates silent failure by providing the highest level of real-time monitoring capabilities that span across detection, response and forensics to ensure nothing is missed, leaving attackers with no place to hide. Falcon Insight provides organizations with state-of-the-art endpoint detection and response (EDR), following an approach recommended by top analyst firms such as Gartner. |
Managed EDR/XDR
|
Hosted WAF / DDOSCloudflare Security Services protect and secure websites, applications and APIs against denial-of-service attacks, customer data compromise, and abusive bots through their advanced CDN and hosted WAF and SSL Services. Cloudflare can automatically filter out illegitimate traffic targeting the application layer through web application firewall (WAF) rulesets, including GET and POST-based HTTP requests. Enable pre-built rulesets such as OWASP Top 10 and Cloudflare application-specific. Build rulesets to specify types of traffic to block, challenge, or let through. Additionally, fast SSL / TLS encryption at the edge of Cloudflare’s network, automated certificate management, and support for the latest security standards.
STHI offers Cloudflare solutions as an extension of our cloud integration services to product customers application systems both on premises and in the cloud. |
Strong Authentication / MFA
Duo's wide variety of authentication methods make it easy for every user to securely and quickly log in. Duo Push, sent by the Duo Mobileauthentication app, allows users to approve push notifications to verify their identity. Duo also supports Universal 2nd Factor (U2F) security tokens, hardware tokens, mobile passcodes, and biometrics like Touch ID to provide flexible and accessible options for all types of users - from clinicians to third-party contractors
|
Strong Authentication / MFA
How do you ensure that only legitimate users have access to your Network or VPN? Trade in your weak, vulnerable password systems for the proven, reliable security of RSA SecurID authentication.
STHI been a certified premier level reseller of RSA Security (Security Dynamics) products for over 25 years with numerous installations throughout the State. Our clients have used these systems to securely connect to their Hawaii systems from locations around the world. |
API Security
Are you using API's to integrate your cloud and prem applications? Do you have security visibility? Using SALT Security , STHI delivers the adaptive intelligence you need to protect your APIs across build, deploy, and runtime phases. We catalog all your APIs, stop attackers during the early stages of an attempted attack, and share insights to improve your API security posture.
|
Security Ops / Managed Detection & Response
IT and security teams are really stretched thin, and most common security tools slow down progress instead of helping them get ahead. The Adlumin Security Operations Platform plus extended risk management is built to help any organization take command of its security and compliance. Adlumin streamlines data ingestion, analysis, and compliance workflows throughout your enterprise — illuminating unseen cyber threats, system vulnerabilities, and IT operations, so your path to response and compliance becomes clear. |
Privileged Access
|
Patch Management
Many organizations juggle separate tools to patch physical and virtual servers—taking on the extra time and resources and increased risk of human error that entails. Others largely ignore the virtual environment—taking on a great deal of risk. We have a better way: a single automated solution that spans not only physical and virtual servers but workstations as well. Ivanti Patch for Windows patches everything from the Windows OS to hypervisors to third-party apps.
|
Content CollaborationEmpower teams, minimize disruption and reduce the risk of private data being accessed (or shared) with consumer-grade apps. Egnyte integrates seamlessly with popular applications, enabling a smooth adoption for both internal and remote users; while always ensuring valuable files remain protected. Egnyte delivers a comprehensive approach to security that offers complete control wherever files are stored. |
|