Skip to main content

Recently Updated Pages

NG SIEM – LastPass Integration

Agent-less Integration

Overview The LastPass Elastic Integration allows the ingestion of data from the LastPass Admin C...

Updated 2 months ago by Iverson

GitHub Integration

System Integrations

GitHub Integration The GitHub integration collects events from the GitHub API. Logs Audit The...

Updated 2 months ago by Iverson

AQUILA - Endpoint Detection and Response (EDR) Automatic Installation

AQUILA EDR Installation

Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, i...

Updated 2 months ago by Richmond Abella

AQUILA - Endpoint Detection and Response (EDR) Manual Installation

AQUILA EDR Installation

Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, i...

Updated 2 months ago by Richmond Abella

User and Entity Behavior Analysis (UEBA)

Identity Security

Overview This system is designed to monitor user behavior, detect anomalies, and track authentic...

Updated 2 months ago by Iverson

Business Continuity Management (BCM)

Risk Management

Overview The Business Continuity Planning (BCP) module in AQUILA provides an easy way to documen...

Updated 2 months ago by Iverson

Supply Chain Risk Management (SCRM)

Risk Management

Overview: This module offers a comprehensive, data-driven solution for managing the organization...

Updated 2 months ago by Iverson

Business Impact Analysis (BIA)

Risk Management

Overview The Business Impact Analysis Dashboard provides a comprehensive view of the entire busi...

Updated 2 months ago by Iverson

CyTech AQUILA - Unified Compliance Framework (UCB)

Cyber Compliance

Overview The Unified Compliance Blueprint is a module within Cyber Compliance designed to help s...

Updated 2 months ago by Iverson

Information Security Steering Committee (ISSC)

Cyber Governance

Overview The ISSC Meeting System is a centralized platform designed to help committees plan, man...

Updated 2 months ago by Iverson

Cyber Training, Culture, and Awareness

Cyber Governance

Overview: The Cyber Training, Culture, and Awareness provides a centralized view of phishing sim...

Updated 2 months ago by Iverson

Charters, Policies, and Procedures

Cyber Governance

Overview: The Charters, Policies, and Procedures Dashboard offer a centralized platform for mana...

Updated 2 months ago by Iverson

Cyber Annual Workplan

Cyber Governance

Overview: The Cyber Annual Workplan Module Dashboard provides a comprehensive view of all ongoin...

Updated 2 months ago by Iverson

Cyber Threat Intelligence (CTI)

Cyber Monitoring

Overview: The CTI (Cyber Threat Intelligence) Module provides real-time insights into emerging t...

Updated 2 months ago by Iverson

Security Orchestration, Automation, and Response (SOAR)

Cyber Monitoring

Overview: The SOAR module helps streamline and enhance security operations by automating respons...

Updated 2 months ago by Iverson

Cyber Risk Assessment Management (CRAM) / OUTDATED

CRAM™ Onboarding Guide

Overview The Cyber Risk Assessment Management (CRAM) framework is designed to provide a comprehe...

Updated 2 months ago by Iverson

JWT For Kali

System Integrations

To create a JSON Web Token (JWT) for Salesforce on Kali Linux, you can follow the steps below. Ka...

Updated 2 months ago by Iverson

NG SIEM- AWS CSPM Integration

Agent-less Integration

Introduction CSPM discovers and evaluates the services in your cloud environment, like storage, ...

Updated 2 months ago by Iverson

Log Collector Installation - Linux Manual

Log Collector Installations

Log Collector Installation in CyTech - AQUILA This guide outlines the step-by-step process for d...

Updated 2 months ago by Iverson

AQUILA EDR Connection Issues - Windows

AQUILA EDR Installation

When Elastic Agent installs Endpoint, they connect locally to share status and updates. If this c...

Updated 2 months ago by Iverson