SNAP-DEFENSE

RISK AND
COMPLIANCE REPORTING

robust RISK AND COMPLIANCE REPORTING FRAMEWORK

In an attempt to combat the proliferation and damage of cyberattacks, many industries, professional organizations, and governments have established security, data protection, and data privacy compliance standards. While many of these compliance standards promote best practices and lessons learned from past misfortune, being “compliant” does not ensure an organization is safe from attack, data loss, or reputation damage.

At Blackpoint, we focus our solutions first and foremost on security. However, we recognize the value in applying best practices and that many organizations have mandatory compliance requirements. Thus, we include compliance mapping and reporting for popular compliance standards for free in our SNAP-Defense platform. We believe an organization can be compliant and significantly more secure without spending a fortune.

Supported Compliance Standards

NIST 800-171

HIPAA

PCI-DSS

NYCRR-500

ISO/IEC-27001

Got a compliance standard we don’t currently support?
Reach out and let us know!

KEY BENEFITS

SNAP-Defense supports compliance adherence as well as audits and assessments. Its dedicated Compliance report allows organizations to identify which compliance controls SNAP-Defense satisfies as well as obtain required information to satisfy audits or assessments.

Real-time &
Historical Reports
Comprehensive
Compliance Checklists
Saves Time
& Money

Identify Security Risks and
Ensure Continuous Compliance

Summary Report

  • Outstanding alerts by criticality, type, and time
  • Overall system health and status
  • Suppressed events by type and time

Privileged Activity Report

  • New/most/least active privileged users
  • New/all remote executions
  • Remote executions by user and application
  • New/all RDP activity
  • RDP activity by user, source, and destination
  • New/all privileged share activity

SECURITY EVENTS REPORT

  • Anti-malware events by severity, type, and time
  • Process and service threats by severity, type, and device
  • New attack sources and targeted devices
  • New point-to-point connections
  • New/all USB activity
  • USB activity by device
  • New/all malware persistence techniques

Network REPORT

  • Detected enumeration activity
  • Enumeration activity by source, destination, and time
  • Core network change detection
  • SNMP community strings
  • Insecure core network passwords
  • Network Management devices, including TACACS, SNMP, NETFLOW, SYSLOG, NTP, and RADIUS

ARE YOU A LARGE ENTERPRISE?

You can also purchase our patented Security Operations and Incident Response platform for use
in your own SOC.
Request a demo today.

Need to be compliant?
See how SNAP-Defense can help!

REQUEST A DEMO >>>