Products

eScan
escan


MicroWorld develops Information Security solutions that provide protection against current and evolving cyber threats. MicroWorld, houses two brands under its banner namely eScan and Nemasis. Our product portfolio encompasses Anti-Virus, Anti-Spyware, Content Security, Anti-Spam, Network Intrusion Prevention Solutions, Vulnerability Assessment and Penetration Test (VAPT). Incorporated in the USA with offices worldwide, we are represented by our partners across the globe.

MicroWorld clientele includes Government and Defence Organizations, companies in Telecom, IT & ITeS, Infrastructure, Finance and Educational Institutions worldwide. Many banking and financial institutions across the world, use our software to protect critical and sensitive data. Our products are also being used in several Schools, Universities, Hospital Networks and Health Care Providers globally.


Why to Perform Vulnerability Assessment?

  • A vulnerability assessment provides an organization with information on the security weaknesses.
  • Provides direction on how to assess the risk associated with those weaknesses and evolving threats.
  • This process offers the organization a better understanding of its assets security flaws & overall risk, reducing the likelihood that a cybercriminal will breach its systems & catch the business off guard.
  • Comprehensive testing for IT infrastructure including Applications, Servers and Network components.
  • Discover vulnerabilities in IT infrastructure at OS, Applications and Network Level.
  • Assist in meeting compliance requirements of PCI, SOX, ISO 27001 & HIPAA standards.



nemasis




Below we have mentioned key features of Nemasis:

  • Scan assets connected across the network for vulnerabilities.
  • Report the vulnerabilities found and provide accurate solutions to fix them.
  • Monitor the security status of the assets in the organization.
  • Create and manage scan tasks for assets.
  • Send customized alerts and reports of scan tasks according to your preferences.
  • Passive vulnerability scanner that continuously monitors network.
  • Inform about open ports, malicious applications or services running on systems connected across network.


Lifecycle of VMS

Nemasis solution proactively supports the entire
Vulnerability Management Lifecycle, that includes:

• Discovery • Verification • Prioritization • Compliance
• Detection • Classification • Reporting • Mitigation


lifecycle



For more information visit:
www.nemasisva.com
www.escanav.com

 Downloads

 



 

 
MarketScape

marketscape

MarkeScape offers a platform called SAGA for the monitoring, tracking, extraction and analysis of data from Hidden Networks and thus be able to inform and prevent clients about these movements that can cause very serious damage to the Organization.

In agreement with the client, a series of tracking keys are established for the specific monitoring of companies, brands, assets, products, people, locations, etc.

SAGA is a proprietary platform belonging to MarketScape, developed by its engineers over the last 10 years.

MarketScape SAGA main features : 

  • Detection of data exposure on the Dark Web.
  • Intelligence in the Dark Web.
  • Fraud and Counterfeit Detection.
  • Data Leak Prevention.


Steps / Functions (see figure below):

Monitoring

  • Collect data from open, deep and dark web with sophisticated automatic crawls and powerful predefined modules, such as Forums, Markets, News, etc.
  • Evaluate the perspective of critical information, automating intelligent workflows.


Data retention

  • Data is collected in near real time and is historically stored and indexed (for later searches) in customer-specific silos on the SAGA platform.

 
Data Filtering

  • Refine and categorize data using keywords and Artificial Intelligence to track company names, VIPs, Addresses, Domains, emails, IP numbers, passwords, trademarks, locations, assets, etc.


Analysis

  • The analysis is carried out by MarketScape specialists, the Partner or the user himself to determine possible threats and their sources. This allows decision-making based on actionable intelligence for tactical investigations.

 
Report generation

  • Adapt, generate and distribute custom periodic reports and alerts to key employees or systems through custom report generators or API's with other tools.


Actions

  • Some actions that can be taken once the corresponding analysis has been done and before the reports provided, are the following:
    • Takedown.
    • More specific and targeted investigations.
    • Social engineering.
    • User specific actions.


flow


Some MarketScape customers


For more information visit:
https://www.marketscape.com/

 

logo Ideagen


Ideagen is a leading global provider of risk management software. With a first-class roster of international clients across many industries, it has the experience and solutions to help solve the specific needs of GRC.

Ideagen's star product is Pentana Audit for computerized support of Internal Audit projects and that supports the implementation of a corporate risk assessment and management system.

Established in 1992, its mission is to support auditors and other service organizations for their professional work, through the innovative use of technology.

Ideagen operates from the UK, with a global focus with offices located in the USA and Australia and with a wide network of distributors around the world.

It implements a consistent methodology that complies with international risk and auditing standards.

  • It simplifies the global deployment of the installation from a web and allows the automatic download of updates without the intervention of the users.
  • It optimizes performance for use across a broad spectrum of network speeds, as well as working locally, to offer a truly appropriate work environment for GRC professionals, being able to work centrally or locally.

 

Other features of Pentana:

Assists audit teams of any size by providing an integrated, consistent and efficient service for the entire organization.

  • It implements a consistent methodology that facilitates the review and interpretation of the results.
  • Meets international standards on risk and auditing.
  • Offers flexible audit plans through organizational structures and processes
  • It allows to carry out the audit work based on risks, identified in an integrated risk register.
  • It offers functionality for sophisticated business interaction through web, mail and electronic document access, for tracking users who need to respond to specific actions.
  • Internally there are many additional functionalities for users who have to interact and change roles in the context of the audit and risk management processes.
  • It allows to use a simple infrastructure so that users can generate notifications by mail, for different business objectives.
  • It has an integral functionality for the management of Audit milestones.
  • It offers flexible analysis that has a direct impact on management, allowing relevant incidents to be quickly understood and therefore responded to in less time and more efficiently.
  • It allows the configuration of business rules and screen layouts that can be adjusted to meet the specific requirements of each client.
  • It uses a simple and intuitive "data grid" methodology for the quick and easy construction and production of detailed and accurate reports.
  • It offers notifications on the home screen type Dashboard, to capture the user's attention.
  • It uses a single interface with a modern desktop design that offers optimized performance over a wide range of Internet connection speeds.
  • It simplifies system deployment and management with automated installation from a website and enables automatic updates without user intervention.
  • Ensures compliance with the strictest security standards.
  • Supports multilingual support, including oriental languages.
  • Avoid the limitations of a web browser interface for daily audit work, using a 'smart client' approach.


Some international clients:

international clients


Some clients in Spain:

clients spain



 
Corporate Intelligence

logo


The CIBUC Organization  Platform  is aimed at offering integrated technology solutions with  Collective Artificial Intelligence .

That is, the application of  Collective Brains  and Artificial Intelligence  for the solution of complex problems, with new technologies.

As an example of this application, in the II CISSTO the Presentation of  “digital valleys”  of the CIBUC organization was  carried out , as an example of Collective Artificial Intelligence, it fully affects integrated development with new technologies and has the potential to attract innovation , talent and investments to the rural world, to put into practice the SDGs and the 2030 Agenda.

Among others,  CIBUC  proposes the following concepts:
  • Teach to collaborate.
  • Automation of processes, tasks and operations.
  • Focus on the Customer.
  • Define digital strategy around objectives.

Recently, the Public Administration has hired the company Innovation Wars SL ( CIBUC)  to help understand the social transformations that the pandemic is causing, as well as the influence of science and technology in the management of covid-19.
 
Fortra Logo

Data Classification – The First Step to Securing your Sensitive Data
If you don’t understand what data you have, how can you know what to do with it?

Most information has a certain amount of value – but how much is it really worth to you, your customers or partners? Data classification can help you make sense of your Big Data, without busting your budget. Data classification empowers user communities who create and handle data to assign value to it, in a language they understand, so that informed decisions can be taken about how it is managed, protected and shared. These values are then stored as visual & metadata labels (protective markings) on messages and documents, and can range from as simple as ‘Confidential’ labels to complex national security driven data classifications.

For almost 30 years, Boldon James has been a leader in data classification and secure messaging solutions, helping organisations of all sizes manage sensitive information securely and in compliance with legislation and standards, in some of the most demanding messaging environments in the world.

Our Classifier product range extends the capabilities of Microsoft products and other solutions to allow users to apply relevant visual & metadata labels (protective markings) to messages and documents in order to enforce information assurance policies, raise user awareness of security policies and orchestrate multiple security technologies.

Benefits of data classification:

  • Increase user and organization awareness of the value and sensitivity of data.
  • Empowers users to take ownership and control of data.
  • Educates users by supporting adherence to corporate governance and data security policies.
  • Helps organizations comply with industry regulations and standards
  • Streamlines business processes - increasing efficiency and operational effectiveness
  • Reduces data management, archiving and storage costs
  • Prevents internal and external data leaks - reducing reputational and business risks.

Some of the Fortra Classifier Clients:

clientes

www.boldonjames.com


Downloads

Infographic

Classifier Overview

Empower Your Users, Drive Your Business

Customer Story: Allianz Irelland


General Data Protection Regulation

GDPR webinar

Protection of personal data: Getting in shape for GDPR