Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

215 total results found

AQUILA - PostgreSQL Integration

System Integrations

Please find below the instructions required to set up this integration: To configure PostgreSQL with the specified logging settings, you need to modify the postgresql.conf file, which is typically located in the PostgreSQL data directory. Here are the steps t...

AQUILA - AWS Integration

System Integrations

Overview The AWS Integration enables the collection of logs and metrics from your Amazon Web Services (AWS) environment. This integration helps centralize security and operational data for monitoring, investigation, and reporting. Data Streams The AWS integ...

AQUILA Deployment Guide: EDR Installation via AD GPO with Scheduled Task

AQUILA EDR Installation

Introduction This guide provides a step-by-step process to deploy the Aquila EDR Agent across multiple Windows endpoints using Group Policy Objects (GPO) with a Scheduled Task. This method ensures automated, consistent deployment across the organization while...

CyTech AQUILA - Cyber Incident Management (CIM) Module

Cyber Monitoring

Overview: Cyber Incident Management (CIM) is the end-to-end process of preparing for, detecting, analyzing, responding to, and recovering from cybersecurity incidents (such as malware infections, data breaches, insider threats, or DDoS attacks). The goal is ...

Cloud Security Posture Management (CSPM)

Cyber Monitoring

Overview: CSPM helps secure your cloud infrastructure by discovering and evaluating cloud services (e.g., storage, compute, IAM) against CIS benchmarks to identify and remediate configuration risks that may affect data confidentiality, integrity, and availabi...

Endpoint Detection and Response (EDR)

Cyber Monitoring

Overview: AQUILA EDR provides organizations with prevention, detection, and response capabilities with deep visibility for EPP, EDR, SIEM, and Security Analytics use cases across Windows, macOS, and Linux operating systems running on both traditional endpoint...

Security Orchestration, Automation, and Response (SOAR)

Cyber Monitoring

Overview: The SOAR module helps streamline and enhance security operations by automating responses to security alerts and orchestrating workflows across various tools and systems. It allows for faster incident detection, response, and resolution, ensuring you...

Cyber Threat Intelligence (CTI)

Cyber Monitoring

Overview: The CTI (Cyber Threat Intelligence) Module provides real-time insights into emerging threats and vulnerabilities. By analyzing various data sources, including external and internal threat intelligence feeds, the CTI module helps organizations proact...

Cyber Annual Workplan

Cyber Governance

Overview: The Cyber Annual Workplan Module Dashboard provides a comprehensive view of all ongoing cybersecurity-related tasks and projects for the year. It helps track and manage key milestones, project deadlines, and progress. This ensures that all cyber ini...

Charters, Policies, and Procedures

Cyber Governance

Overview: The Charters, Policies, and Procedures Dashboard offer a centralized platform for managing and tracking the lifecycle of all organizational charters, policies, and procedures. It allows users to efficiently monitor the status, progress, and approval...

Cyber Training, Culture, and Awareness

Cyber Governance

Overview: The Cyber Training, Culture, and Awareness provides a centralized view of phishing simulations, user awareness campaigns, and email security reports. It allows administrators to track user engagement, identify high-risk individuals, and measure the ...

CyTech AQUILA – Cyber Security Compliance (Module)

Cyber Compliance

Overview: The purpose of Cyber Security Compliance is to make sure that an organization follows established laws, regulations, and industry standards designed to protect sensitive data and systems. Key Features: Dashboard – Real-time view of overall compl...

CyTech AQUILA - Unified Compliance Framework (UCB)

Cyber Compliance

Overview The Unified Compliance Blueprint is a module within Cyber Compliance designed to help security teams monitor the implementation of security controls, track compliance with frameworks, and manage blueprint engagement. Key Features Control Overview...

Cyber Security Risk Management (CSRM)

Risk Management

Overview: Cyber Security Risk Management (CSRM) is a structured process organizations use to identify, assess, mitigate, and monitor cyber threats and vulnerabilities that could impact their assets, operations, or reputation. It integrates cybersecurity into ...

Business Impact Analysis (BIA)

Risk Management

Overview The Business Impact Analysis Dashboard provides a comprehensive view of the entire business of the client and their loss revenue and total downtime cost of assets.  Key Features Impact Analysis - Status Total Downtime Cost - by Asset Chart Tota...

Supply Chain Risk Management (SCRM)

Risk Management

Overview: This module offers a comprehensive, data-driven solution for managing the organization's Supply Chain Risk and Vendor Lifecycle. It provides security, procurement, and risk teams with a unified platform to onboard, assess, monitor, and mitigate risk...

CyTech AQUILA - Vulnerability Assessment and Management (Module)

Risk Management

Overview: In AQUILA, the Vulnerability Assessment and Management (VAM) module is designed to help organizations identify, analyze, prioritize, and remediate security weaknesses across their IT infrastructure. Key Features: Dashboard - Provides an overview...

CyTech AQUILA - Virtual Penetration Testing (Module)

Risk Management

Overview: Virtual penetration testing is a controlled, authorized simulated attack on an organization’s systems that’s performed remotely (often against virtualized, cloud, or networked environments) to discover security weaknesses before malicious actors do....

Business Continuity Management (BCM)

Risk Management

Overview The Business Continuity Planning (BCP) module in AQUILA provides an easy way to document critical business functions, assess downtime impact, and define recovery needs. It also helps map dependencies, assign team roles, and keep track of contacts. Wi...

User and Entity Behavior Analysis (UEBA)

Identity Security

Overview This system is designed to monitor user behavior, detect anomalies, and track authentication activities to ensure the security of your environment. It provides a comprehensive view of risky users, anomaly detection trends, and authentication attempts...