By only redirecting the external DNS Servers to DNSCyte, the system starts to discover and block threats.
Yes. DNSCyte provides more than 70 different categories like gambling, games to provide secure access to the Internet.
Yes. We integrate with any internal DNS Server to identify the source of malicious traffic.
Windows DNS, OpenDNS, F5, Infoblox are some of the major DNS servers supported.
Yes. A very lightweight agent is installed on desktop and mobile platforms to enforce DNSCyte DNS servers enabling secure Internet access 24/7.
Yes. DNSCyte can provide protection from zero-day attacks. Advanced whitelisting enables smooth browsing in Internet without the risk of accessing unknown destinations.
Yes. DNSCyte blocks DNS tunnelling.
Multi-Factor Authentication (MFA) is a security system that verifies a user’s identity by requiring multiple credentials rather than just asking for a username and password, MFA requires other—additional—credentials, such as a code from the user’s smartphone, the answer to a security question, a Push Notification Confirmation, fingerprint, etc.
A list of supported platforms are summarised below:
• Salesforce
• Office 365
• Amazon
• Dropbox
• DocuSign
• Windows Logon
• Microsoft RDP
• Linux Logon
• Microsoft OWA Logon
• Microsoft ActiveSync Logon
• VPN Login
• OpenLDAP
• Microsoft Active Directory
• Microsoft SQL Server
• API for supporting any custom application.
IDCyte provides support for on-premise and cloud deployments based on the preference.
Yes. Users can execute self-service password reset and change, account opening, and worker processes that are running in Microsoft Windows Active Directory or OpenLDAP.
Yes. SAML 2.0 is supported.
IDCyte Push, sent by our IDCyte Mobile authentication app, allows users to approve push notifications to verify their identity. We also support Universal 2nd Factor (U2F) security tokens, hardware tokens, mobile OTP and SMS to provide flexible and accessible options for all types of users – from clinicians to third-party contractors.
Yes. It is possible to see and control where users are authenticated, and unauthorised access from undefined geographic locations can be prevented.
NetCyte is a network access control and threat discovery platform providing total visibility and policy enforcement. NetCyte is an agentless, 802.1X independent solution to prevent unauthorised computer access to corporate networks.
NetCyte has distinctive features providing solutions to challenges in discovering cyber threats as summarised below:
• Ability to discover weak passwords in any kind of device.
• Detect port scans and password breach attempts without an agent installation or requiring an appliance on remote networks.
• Track important audit data. Important security events like password changes, account lockouts, event log deletion and group membership changes can be discovered.
• Advanced process analysis for discovering traffic flow.
• Discover hubs/stacked devices in the infrastructure.
• In-Depth inventory and threat discovery without an agent detailed than any of its competitor.
• Ability to integrate with any network device supporting remote connection without any dependency.
• Unprecedented scalability.
• Different methods for discovery and blocking.
• Easy discovery without depending on network devices or traffic sniffing.
There are no special networking requirements to deploy NetCyte. The solution does not require the installation of any software in user machines. Sniffing or port mirroring is also not needed.
• NetCyte can do advanced threat analytics without needing an agent and appliance on remote networks.
• As the number of remote computers increases the agentless operation mode creates false alarms in competitor products.
• NetCyte can detect port scans and password breach attempts without an agent installation or requiring an appliance on remote networks.
• NetCyte can track important audit data without an agent.
• The implementation cycle is significantly lower.
• Customizable scripting interface for executing commands on network devices enables organisations to manage possible issues related to command execution much more effectively.
The agentless technology provides accurate visibility with greater scalability thanks to our Windows-based platform. Any device in the network is discovered in real-time. The system is managed centrally without any components on remote network segments. NetCyte support discovery through ARP Tables, MAC Address Tables, ARP Broadcasts and Traffic Mirroring.
The core function of netCyte is automation. Security profiles can be assigned to any device accessing the network. Any job can be initiated using customizable scripting interfaces supporting batch scripts, PowerShell and SSH.
By supporting any possible method of policy enforcement netCyte is a leader in policy enforcement. Network device configuration management, ARP redirection, 802.1X, TCP connection resetting are the main methods for enforcement.
• Processes Utilizing Network Ports
• Processes Creating Network Traffic
• Bandwidth Utilization Analysis
• Network Connection Analytics
• Port Scan Detection
• Password Breach Attempt Detection
• Weak SNMP Credential
• Discovery Weak Windows Credential Discovery
• Malware Discovery
• Malicious Driver Discovery
• Malicious Service Discovery
• Malicious Start-up Object Discovery
• Malicious Scheduled Task Discovery
Every connected device is scanned for threats using remote connection protocols like SSH, SNMP, PowerShell, WMI and RPC. Device access is blocked if noncompliance detected.

Join the PartnerCyte inner Circle

Privacy and Cookie Policy
© 2019 CyberCyte. All Rights Reserved.