LOADING

Technology Products

Whatever you need we have the product for you

Perimeter / Firewall Security

Secure your perimeter from risky activity, suspicious traffic, and advanced threats. Reporstar Technologies make use of perimeter defense technologies like Next Generation Firewalls, Intrusion Prevention Systems (IPS), Data Loss Prevention (DLP), Denial of Service (DDoS) and Virtual Private Network (VPN) systems to achieve this.

  • Check Point

  • Cisco

  • Fortigate

  • Sophos

  • SkyboxSecurity

SIEM Security

Real-time analysis of security alerts generated by applications and network hardware events and logs provide valuable security information and triggers. Reportstar Technologies SIEM solutions pull together the information that your security staff needs to identify and respond to internal and external threats.

  • AlienVault

    AlienVault

  • AanVal

    AanVal

  • GFI EventsManager

    GFI EventsManager

Office365 & GSuite Security

Dramatic growth in the use of cloud-based email for the enterprise brings with it an array of security risks, including susceptibility to sophisticated attacks such as ransomware, phishing and Advanced Persistent Threats. Prevent these known and unknown threats, malware and ransomware from reaching end-users whether in email or documents. These threats use email and documents as a primary entry point. Reportstar Technologies provides an efficient and cost effective cloud security solution.

  • CloudGuard

  • Netskope

AWS / Azure / Google Cloud Security

Adopting public cloud infrastructure means security is now shared between you and your cloud provider. Reportstar Technologies delivers automated and elastic security to keep cloud-based assets and data protected in the cloud from attacks with comprehensive threat prevention.

  • CloudGuard IaaS

    CloudGuard IaaS

VMWare / Hyper-V / KVM / Cisco ACI Security

Security for all your Datacenter virtualization platforms to decreases the risk and spread of lateral (east-west) threats. Protect your assets and data within the industry leading Hypervisors (VMware ESXi, Hyper-V and KVM) with the full range of Firewall security, Intrusion Prevention, Application Control, DLP and Threat Extraction from internal and external threats

  • CloudGuard PrivateCloud

Endpoint Security

Protection against Viruses and Malware threats for your endpoints and servers. This solution delivers granular endpoint protections, including anti-ransomware and exploit prevention technologies in a single agent managed through one console to improving efficiency. Additional capabilities like device encryption, media encryption and port disablement are additional components to enable complete endpoint protection.

  • CheckPoint Endpoint

    CheckPoint Endpoint

  • Sophos Endpoint

    Sophos Endpoint

  • TrendMicro

    TrendMicro

  • Kaspersky

    Kaspersky

Zero Day Threat Security

Zero-day and ransomware protection against advanced attacks for your devices including identifying hosts with infected bots. Prevent, protect and quickly respond to advanced attacks including sending files to evasion-resistant sandboxes and removing phishing links from files and emails. Coupled with centralized management which features forensics recording and analysis you can produce an actionable incident report and quick identification of the malware’s point of entry.

  • Sandblast

  • Intercept X

Mobile Device Security

Comprehensive enterprise-grade mobile security that protects iOS and Android devices, apps, and the networks they depend on from advanced mobile threats like malicious apps, man-in-the-middle interception, SMS phishing, Zero-day and ransomware to name a few.

  • Sandblast Mobile

    Sandblast Mobile

Network Monitoring

Monitor your IT environment health and get a view of your servers, VMs, network devices, and applications performance from a unified dashboard. Evaluate your capacity by using historic data to plan for future server capacity needs and track performance trends for SLA compliance, coupled with detailed reporting.

  • Uptime

  • GFI EventsManager

AD Active Directory Compliance

Get visibility into User Behavior and Risk with security intelligence about what’s going on in the Active Directory and Group Policy. See the current state of your users and groups and detect all changes and their permissions in Active Directory and GPOs and their settings - produce reports and get alerts.

  • Netwrix AD Auditor

    Netwrix AD Auditor

Windows File Server Compliance

Get complete visibility into changes, data access and data usage on file servers with security intelligence about all changes made to files, folders, shares and permissions together with file access auditing; data discovery and data classification. With Data Classification you can produce a sensitive file audit by providing information about what types of sensitive data you have, where it is located, who has access to this data and how it’s used. Comprehensive reporting provides for improved data security and information management.

  • Netwrix File Server Auditor

Windows Server Compliance

Get complete visibility into what’s going on in your Windows server environment with server configuration comparisons to a last known “good” baseline and monitor all changes made to them. Report on both failed and successful account logon attempts on monitored computers to investigate security incidents. Keep your Windows servers secure and prove IT compliance by regularly auditing your configurations.

  • Netwrix Windows Server Auditor

    Netwrix Windows Server Auditor

Firewall Reporting

Interpret your Internet gateway's log files to deliver useful reporting to firewall administrators, department managers, HR departments and YOU. Generate Overview Reports or detailed Activity Reports on users, sites, apps, categories or any traffic that flows through your firewall or proxy. Generate these reports based on predefined templates or customized and scheduled as required.

  • Sophos Reporter

  • Sonicwall Reporter

  • Barracuda Reporter

Network Device Reporting

Versatile log file analysis optimized for network usage reporting to get the right report delivered to the right person. Network devices generate huge amount of log files that can be turned into useful and actionable reports using the correct tools. Reports may be quickly made and customized to help in making important decisions on capacity additions, device upgrades and SLA verifications.

  • Webspy

    Webspy

One Time Passwords

Passwords valid for only a one-time use reduces the risk of compromising a user’s identity. Strong authentication methods typically involve dynamically generated OTPs or certificate and context-based authentication. The OTP works by having a security device or token in the user's possession and a back-end server. The security device may be hardware-based, such as a tamper-resistant key fob, or software-based, such as a mobile phone app. One-time passwords may also be delivered to mobile phones using SMS or Push Technology.

  • Vasco Identikey

Firewall Managed Service

Strong perimeter security is an essential prerequisite to successfully protect your business’s networks and corporate applications. This requires a level of vigilance that takes time, effort and specialised expertise. Reportstar Technologies managed firewall service is built on commercially supported, industry-leading products from providers such as Cisco, Check Point, Fortinet and Sophos.

  • MSSP

    MSSP

Vulnerability Scanning

A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment. Reportstar Technologies solutions provide a detailed analysis of the state of your network, this includes applications or default configurations posing a security risk.

  • Tenable

  • GFI Languard

Firewall Compliance

Zoom in on security control gaps with comprehensive network modeling and cutting-edge attack vector analytics. Create a model of your attack surface by collecting data from all network devices and security systems automatically. This will assist in Identifying potential attack vectors and prioritize remediation plans right for your network and its threats landscape- additionally get actionable intelligence in minutes and improve your process around change management. Firewall compliance makes it easier for operational teams to understand security risks and cyberthreats — and plan how to address them

  • SkyboxSecurity

    SkyboxSecurity

Monitoring as a Service

Ensure maximum usage and return on IT investments with quick identification and alerting of problems 24 x 7. Reportstar Monitoring Service provides your enterprise with real-time, 24x7 monitoring and response across your security infrastructure and critical information assets. Security Monitoring Services includes alerting via email and SMS.

  • MaaS

Firewall Compliance as a Service

The compliance platform combines firewall and network device data with vulnerability and threat intelligence, prioritizing security issues in the context of your unique environment. This analytics service reduces response times to risks, bringing firewall, vulnerability and threat management processes for complex networks under control.

  • Skybox aaS

    Skybox aaS

SIEM Managed Service

The core feature of SIEM technologies is the ability to gather security data from the critical assets residing on your network and to present that data as actionable information. Reportstar Technologies managed SIEM service is built on commercially supported, industry-leading solutions to provide 24/7 performance and security incident event monitoring.

  • Managed SIEM Service

Database Monitoring

Monitor, alert, and diagnose the availability, health, and performance of Microsoft SQL and MySQL Servers in physical, virtual, and cloud environments. Find query bottlenecks via wait state workload analysis and configure alerts to inform and warn about approaching issues in your database by using custom thresholds.

  • Database Monitoring

    Database Monitoring

Sign Up for Security Updates

Sign up here to receive the latest monthly updates - updates@reportstar.net

Please complete required fields.
Please enter a valid email address.

Our Clients

We collaborate, assist and support various solutions with these esteemed organisations

Contact

ReportStar House, 114 4th Street, Parkmore Sandton, Gauteng, South Africa, 2196

+27118847633

info@reportstar.net

© Copyright 2018 Reportstar Technologies All rights reserved

Terms & Conditions