Advanced Search
Search Results
215 total results found
AQUILA - PostgreSQL Integration
Please find below the instructions required to set up this integration: To configure PostgreSQL with the specified logging settings, you need to modify the postgresql.conf file, which is typically located in the PostgreSQL data directory. Here are the steps t...
AQUILA - AWS Integration
Overview The AWS Integration enables the collection of logs and metrics from your Amazon Web Services (AWS) environment. This integration helps centralize security and operational data for monitoring, investigation, and reporting. Data Streams The AWS integ...
AQUILA Deployment Guide: EDR Installation via AD GPO with Scheduled Task
Introduction This guide provides a step-by-step process to deploy the Aquila EDR Agent across multiple Windows endpoints using Group Policy Objects (GPO) with a Scheduled Task. This method ensures automated, consistent deployment across the organization while...
CyTech AQUILA - Cyber Incident Management (CIM) Module
Overview: Cyber Incident Management (CIM) is the end-to-end process of preparing for, detecting, analyzing, responding to, and recovering from cybersecurity incidents (such as malware infections, data breaches, insider threats, or DDoS attacks). The goal is ...
Cloud Security Posture Management (CSPM)
Overview: CSPM helps secure your cloud infrastructure by discovering and evaluating cloud services (e.g., storage, compute, IAM) against CIS benchmarks to identify and remediate configuration risks that may affect data confidentiality, integrity, and availabi...
Endpoint Detection and Response (EDR)
Overview: AQUILA EDR provides organizations with prevention, detection, and response capabilities with deep visibility for EPP, EDR, SIEM, and Security Analytics use cases across Windows, macOS, and Linux operating systems running on both traditional endpoint...
Security Orchestration, Automation, and Response (SOAR)
Overview: The SOAR module helps streamline and enhance security operations by automating responses to security alerts and orchestrating workflows across various tools and systems. It allows for faster incident detection, response, and resolution, ensuring you...
Cyber Threat Intelligence (CTI)
Overview: The CTI (Cyber Threat Intelligence) Module provides real-time insights into emerging threats and vulnerabilities. By analyzing various data sources, including external and internal threat intelligence feeds, the CTI module helps organizations proact...
Cyber Annual Workplan
Overview: The Cyber Annual Workplan Module Dashboard provides a comprehensive view of all ongoing cybersecurity-related tasks and projects for the year. It helps track and manage key milestones, project deadlines, and progress. This ensures that all cyber ini...
Charters, Policies, and Procedures
Overview: The Charters, Policies, and Procedures Dashboard offer a centralized platform for managing and tracking the lifecycle of all organizational charters, policies, and procedures. It allows users to efficiently monitor the status, progress, and approval...
Cyber Training, Culture, and Awareness
Overview: The Cyber Training, Culture, and Awareness provides a centralized view of phishing simulations, user awareness campaigns, and email security reports. It allows administrators to track user engagement, identify high-risk individuals, and measure the ...
CyTech AQUILA – Cyber Security Compliance (Module)
Overview: The purpose of Cyber Security Compliance is to make sure that an organization follows established laws, regulations, and industry standards designed to protect sensitive data and systems. Key Features: Dashboard – Real-time view of overall compl...
CyTech AQUILA - Unified Compliance Framework (UCB)
Overview The Unified Compliance Blueprint is a module within Cyber Compliance designed to help security teams monitor the implementation of security controls, track compliance with frameworks, and manage blueprint engagement. Key Features Control Overview...
Cyber Security Risk Management (CSRM)
Overview: Cyber Security Risk Management (CSRM) is a structured process organizations use to identify, assess, mitigate, and monitor cyber threats and vulnerabilities that could impact their assets, operations, or reputation. It integrates cybersecurity into ...
Business Impact Analysis (BIA)
Overview The Business Impact Analysis Dashboard provides a comprehensive view of the entire business of the client and their loss revenue and total downtime cost of assets. Key Features Impact Analysis - Status Total Downtime Cost - by Asset Chart Tota...
Supply Chain Risk Management (SCRM)
Overview: This module offers a comprehensive, data-driven solution for managing the organization's Supply Chain Risk and Vendor Lifecycle. It provides security, procurement, and risk teams with a unified platform to onboard, assess, monitor, and mitigate risk...
CyTech AQUILA - Vulnerability Assessment and Management (Module)
Overview: In AQUILA, the Vulnerability Assessment and Management (VAM) module is designed to help organizations identify, analyze, prioritize, and remediate security weaknesses across their IT infrastructure. Key Features: Dashboard - Provides an overview...
CyTech AQUILA - Virtual Penetration Testing (Module)
Overview: Virtual penetration testing is a controlled, authorized simulated attack on an organization’s systems that’s performed remotely (often against virtualized, cloud, or networked environments) to discover security weaknesses before malicious actors do....
Business Continuity Management (BCM)
Overview The Business Continuity Planning (BCP) module in AQUILA provides an easy way to document critical business functions, assess downtime impact, and define recovery needs. It also helps map dependencies, assign team roles, and keep track of contacts. Wi...
User and Entity Behavior Analysis (UEBA)
Overview This system is designed to monitor user behavior, detect anomalies, and track authentication activities to ensure the security of your environment. It provides a comprehensive view of risky users, anomaly detection trends, and authentication attempts...