Simple - Contextual dasboards relevant

BOSS™ offers you comprehensive, highly granular dashboards. Reports are customized to provide only the information relevant to the function within the organization. No more wasted time wasted sifting through millions of lines of syslog events to find a needle in a hay.

Powerful - Broad range of tools

From advanced, real-time, cyber-threat analytics, to uptime availability monitoring, BOSS™ will give you insight and confidence that will fundamentally change the way you do business.

Automated

BOSS™ automatically resolves "zero-day" exploits, potential security holes, disovers new devices, all before you even think about. Increase your workforce productivity through automation of highly repetitive and highly burdensome tasks.

Genius

Delivered "as a service", we eliminate the need for maintenance fees, support contracts, advanced training, and persistent tuning. We also use existing, open source tools to leverage your enterprise IT costs. We eliminate annual licensing, support and maintenance fees

DNSBOSS™

Provides DNS Actiivty monitoring for activity to and from known malicious hosts or outside baseline of approved DNS server list

5thcolumn Dashboard Example

FireBOSS™

Seamless integration with FireSIGHT and FirePOWER appliances from Cisco for indefinite reporting using e-streamer API and / or Syslog

FireBOSS™ integrates seamlessly with Cisco appliances FireSIGHT and FirePOWER, allowing for indefinite reporting.

Better navigate your existing appliances using contextual search and reporting functions, trend reports based on user-specified parameters, threat intelligence integration and content disposition reporting.

Light incoming threats ablaze by taking advantage of FireBOSS™' real-time threat identification and remediation tools. FireBOSS™ is ODBC & e-streamer API friendly.

FireBoss Dashboard Example FireBoss Dashboard Example

FlowBOSS™

Netflow collection, normalization, event detection

FlowBOSS Dashboard Example FireBoss Dashboard Example

LogBOSS™

Log aggregation suite for any device that generates log data

Know when your data is compromised, as its happening, when it's happening, and where it's happening.

Utilize LogBOSS™ suite's real-time correlation and analytical dashboard to show where malware is detected, and its entry point into your system.

Visualize where your assets are most needed by referencing the geo-mapped locations of event and alarm data, locating threats with pinpoint accuracy.

Aggregate all generated log data, regardless of what device is being used on the network. LogBOSS™ is the authority on forecasting protocol trends and alarms, and even has the option of running fully automated.

LogBOSS Dashboard Example

Packet Revolver

- Let our Packet Revolver keep an eye on what matters most to your company – observe and control your data by providing a centralized collection point for all your company's data needs. It's a fortified solution for all data aggregation and normalization. Finally, a way for data to accessed easily, without the complications.

StealthBOSS™

Data Enrichment and visualization engine for Lancope's Stealthwatch product

BOSS Dashboard Example

Threatrospective™

Reinforce the cracks in your security system by harnessing our Threatrospective™ technology.

By cross referencing with our database of IPs and URLs known to be malicious or participants in Command and Conquer botnets, 5th Column has the advantage in assuring your data stays secure, sorted and reliable.

By being able to source information from Threatgrid, PassiveTotal, DNSDB, Maltego, and other databases all at once gives Threatrospective™ the real-time contextual awareness capable of preventing malicious behavior – before it infects your enterprise.

Threatrospective Dashboard Example Another Threatrospective Dashboard Example

WebBOSS™

Provide user reporting for web activity based on category and reputation and volume.

WebBOSS Dashboard Example WebBoss Dashboard Example

Threatrospective™

Threatrospective Dashboard Example Threatrospective Dashboard Example

Interrogated.net

Interrogated works with unprecedented success to protect IT assets. Malicious behavior is simulated, analyzed, and tracked to it's endpoint. It is capable of full session file extraction for analysis and disposition reporting.

5thColumn Logo


BOSS™

SECURITY ORCHESTRATION PLATFORM

Next generation cyber-threat management, intelligence, and automated response

Take your security operations to the next level with BOSS™. Removing concerns and cyber distractions enables you to re-focus on business objectives and 5thColumn can handle the rest. Experience the power of real-time threat identification, correlation, validation, and remediation.

Unparallelled

Unparalleled Security

Redefine what it means to keep data secure. BOSS™ is your data's best defense against cyber intrusion.

BOSS™ keeps your business thriving by resolving threats to your productivity as they happen - through advanced algorithmic automation. Using our proprietary Business Operational Security Suite (BOSS) , 5thColumn extends the capabilities of existing solutions to enable real-time visibility into endpoint, user, and network health and behavior.

Simple

Contextual dashboards

BOSS™ offers you comprehensive, highly granular dashboards. Reports are customized to provide only the information relevant to the function within the organization. No more wasting time sifting through millions of lines of syslog events to find a needle in a hay.

Powerful

Broad range of tools

From advanced, real-time cyber-threat analytics, to uptime monitoring reports and logging, BOSS™ will give you insight and confidence that will fundamentally change the way you do business.

Time Saving

Automated remediation and operation

BOSS™ automatically resolves 'zero-day' exploits, potential security holes, and discovers new devices, all before you even think about it. Increase your workforce productivity through automation of highly repetitive and highly burdensome tasks.

Genius

Return on investment

Delivered 'as a service', we eliminate the need for maintenance fees, support contracts, advanced training, and persistent tuning. We also use existing, open source tools to leverage your enterprise IT costs.

Cloud Based

Cloud Based Protection

Harness the power of the cloud in ways you never thought possible. Threats get routed to our Cloud Platform, while your enterprise benefits from resulting threat analytics

Leveraging SDN, and intelligent WAN technology, our solution can redirect web, email, and other traffic directly to our Interrogated™ Cloud for identification and classification. Consolidating over 100 sources of Cyber-Intel, the deepest possible inspection capabilities identify anomalies and threats anywhere in the processing stack.

Even when we cover all common entry vectors for malware and malicious content, our stackable cloud applications quickly inspect all your content for real time protection. We can do this all at a safe distance from your enterprise.

Encrypted Storage and Transmission

All the data collected is stored and transmitted using DOD standards for privacy and encryption ensuring the safety and reliability of your critical information assets.

Virtual Operations

Operate our platforms and virtual appliances from anywhere, over the wire, and without any risk of interception or breach.

Data Center

We own and operate a tier 3+ data center in downtown Chicago. This has enabled us to provide absolute reliability and assurance that your data assets are always highly secured and available.

Visualize

Visualize Your Operation

Know if your data is at risk, if it's compromised, and where it may happen.

You're able to see real-time correlation and analytical dashboard where malware is detected, and its entry point into your system. Visualize where your assets are most needed by referencing the geo-mapped locations of event and alarm data, locating threats with pinpoint accuracy.

Aggregate all generated log data, regardless of what device is being used on the network. BOSS™ is the authority on forecasting protocol trends and alarms, and even has the option of running fully automated.

Integrates seamlessly with Cisco appliances, allowing for indefinite reporting

Better navigate your existing appliances using contextual search and reporting functions, trend reports based on user-specified parameters, threat intelligence integration and content disposition reporting.

Light incoming threats ablaze by taking advantage of the FireBOSS™ real-time threat identification and remediation tools. FireBOSS™ is ODBC & e-streamer API friendly.

Tools

BOSS™

Management Tools

We offer tools that are stacked in your favor when it comes to enterprise IT operation, data protection, and cyber-threat management.

BOSS™ Interrogated
BOSS™ Enterprise
BOSS™ Community
Community AppsOpenSource integrated components
LogBOSS™
Log collection and event identification
FlowBOSS™
Netflow collection, normalization, event detection
FireBOSS™
Contextual search and reporting
Dashboard ViewCustomizable dashboards for endless reporting and visualization options
Shared IntelligenceIntelligence repository access aggregated across all customer use cases
Automated IR Auto Response for triage and remediation of breached systems, networks, hosts as well as infected endpoints
Mobile ViewMobile Apps for dashboard access and reporting
WebBOSS™
User reporting for web activity based on category and reputation and volume
MailBOSS™Mail anomoly and attack detection / mitigation
DNSBOSS™
DNS Actiivty monitor for activity to and from known malicious hosts or outside baseline of approved DNS server list
Threatrospective™
Dashboard for reporting on attacks prevented and threats prevailing within organization
Breach DetectionIdentify and validate alarms for endpoint activity using automation / orchestration engine
Security OperationsAutomated security operations, event analysis, and triage / remediation"
Interrogated SandboxMultiple sandbox technologies with support for client specific image testing
Interrogated POPLast hop service for ingress / egress traffic inspection layers 2 through 7

Advanced Tools

Advanced Cyber Threat

Threatrospective™

Proactive cyber-prevention

Reinforce the cracks in your security system by harnessing our Threatrospective™ technology.

By cross referencing with our database of IPs and URLs known to be malicious or participants in Command and Conquer botnets, 5thColumn has the advantage in assuring your data stays secure, sorted and reliable. Being able to source information from Threatgrid, PassiveTotal, DNSDB, Maltego, and other databases all at once gives Threatrospective™ the real-time contextual awareness capable of preventing malicious behavior - before it infects your enterprise.

 

Interrogated.net

Threat sandbox and analysis

Get to the root cause and identify next steps with Interrogated.net

Interrogated works by creating a virtual environment for malware behavior where it is simulated, analyzed, and tracked to the endpoint. It's capable of full session file extraction for analysis and disposition reporting to see how and where it may strike next. This is how we proactively keep your data protected.

Flowchart

Dashboard

LogBOSS™FlowBOSS™FireBOSS™WebBOSS™MailBOSS™ Firewall BreachDetection! File / Packet Inspection Open-source cyber-threatintelligence Interrogated.netThreat sandbox DedicatedServer Threatrospective™ AutomatedRemediation HistoricalLogging DATA CENTER CustomerPortal Support and Incident Response BusinessIntelligence 24/7 Monitored Area

Advance

Advance your position

With a level of service beyond compare, BOSS™ pivots you from assessment to oversight, analysis to management, remediation to automation, and confidence to executive leadership.

The insight your organization will gain from being able to see your IT infrastructure data more clearly will fundamentally change the way you do business.

ROI

Lower your total cost of ownership compared to off-the-shelf solutions and far less complex than in-house deployments with advanced threat intelligence, early warning, forensic analysis, and acknowledgment / escalation features.

Support

Service, support, 24/7x365. This is our mantra. We have certified, cross-industry experts available to support you any time of the year no matter how complex a challenge.

Seeing is believing

Questions?

Take Action

Take action

Are you ready for the future?

Let us advance your enterprise to the next level of data security and cyber-threat management.


Learn more about our products and services:

 

Get an over the phone assessment of your network today.

Learn More