INTEGRATED SECURITY

We are focused on next-generation cyber-threat protection and enterprise data security products to ensure your data is available, resilient, and secure.

5thColumn Logo

INTEGRATED SECURITY

We are focused on next-generation cyber-threat protection and enterprise data security products to ensure your data is available, resilient, and secure.

 
CYBER THREAT AWARENESS

Cyber-threat protection under a single platform.

5thColumn is dramatically simplifying the complexities and level of effort associated with today’s advanced threat landscape.

Whether that’s done by providing a unified orchestration platform that provides a contextual awareness between various point solutions or by optimizing and automating the detection to remediation life cycle.

Cyber-threat awareness with a unified platform.

5thColumn is dramatically simplifying the complexities and level of effort associated with today’s advanced threat landscape.

Whether that’s done by providing a unified platform that provides a contextual awareness between various point solutions or by optimizing and automating the detection to remediation to transition.

 
 

Core Products

With the ability to be fully managed or self managed, we have the tools, interfaces, and knowledge to ensure your business is protected from cyber threats and your IT infrastructure is operating at the optimal state.

 
 

BOSS™
 

 

Big-data analytics and
visualization engine

Security orchestration platform that provides next-generation cyber-threat management, intelligence, and automated response

  • Full Packet Capture
  • Data Normalization
  • Modular Features with Software Architecture
 

PacketREVOLVER™
 

 

Single collection and
aggregation point

Single data collection and aggregation solution that provides normalization and many modular features

  • Real-time monitoring view
  • Scheduled Reporting
  • Trigger based Actionable Alerts
  • Ultra-Scalable Cluster Architecture
 

INTERROGATED Networks™

 

Cyber intelligence
engine

Cyber intelligence engine that provides client and vertical specific intelligence along with root cause detection

  • Highest quality Intelligence
  • Targeted Intelligence (client and vertical specific)
  • Threatrospective Analysis
  • Root Cause Detection and Triage
 

AR5™
 

 

Automated Response
Engine 5


Automated response engine that leverages AI, self-learning, and can run from partial to full autonomy

  • Ensemble Bayesian Learning / AI
  • Heuristic & self learning remediation engine
  • Multiple solution options based on historical efficacy
  • Can automate triage and remediation from partial to full autonomy
 

BOSS™
 

Big-data analytics and
visualization engine

BOSS™ is a security orchestration platform that provides next-generation cyber-threat management, intelligence, and automated response

  • Full Packet Capture
  • Data Normalization
  • Modular Features with Software Architecture


PacketREVOLVER™
 

Single collection and
aggregation point

PacketREVOLVER™ is a single data collection and aggregation solution that provides normalization and many modular features

  • Real-time monitoring view
  • Scheduled Reporting
  • Trigger based Actionable Alerts
  • Ultra-Scalable Cluster Architecture


INTERROGATED Networks™

Cyber intelligence
engine

INTERROGATED Networks™ is a cyber intelligence engine that provides client and vertical specific intelligence along with root cause detection

  • Highest quality Intelligence
  • Targeted Intelligence (client and vertical specific)
  • Threatrospective Analysis
  • Root Cause Detection and Triage


AR5™
 

Automated Response
Engine 5

AR5™ is an automated response engine that leverages AI, self-learning, and can run from partial to full autonomy

  • Ensemble Bayesian Learning / AI
  • Heuristic & self learning remediation engine
  • Multiple solution options based on historical efficacy
  • Can automate triage and remediation from partial to full autonomy
 
 

Components and Capabilities

Our central knowledge plane, called BOSS™, allows you to progressively manage your defensive strategy, products, technologies, and dynamically adjust/tune them based on the latest and most sophisticated threat intelligence available.

 
 

Automated IR

Auto Response for triage and remediation of breached systems, networks, hosts as well as infected endpoints.

Breach Detection

Identify and validate alarms for endpoint activity using automation and orchestration engine.

Business Intelligence

Whether it is credit card records, financial information, or highly sensitive intelligence documents, we have the expertise and track record to protect and manage all of your data assets.

Community Apps

Open-source integrated components.

Cyber Intelligence

By helping an organization move away from a fragmented or compartmentalized risk management framework, we bring the proven methodology and guidance that is necessary to implement effective risk mitigation strategy.

Cyber Intelligence is a managed service

Dashboard

Customizable dashboards for reporting and visualization

Secure Data Center

Our new Tier 3+ data center in downtown Chicago has enabled us to provide absolute reliability and assurance that your data assets are always highly secured and available.

Secure Data Center is a managed service

DNSBOSS™

DNS Activity monitor for activity to and from known malicious hosts or outside baseline of approved DNS server list

 

FireBOSS™

Contextual search and reporting

FlowBOSS™

Netflow collection, normalization, and event detection

Incidence Response

With our response management capabilities we stand ready to support your organization in both planning for future attacks as well as dealing with current activity.

Incidence Response is a managed service

Interrogated DNS

Combines advanced cyber-threat behavior analysis, packet classification and assessment, with cyber intelligence networks.

Interrogated POP

Last hop service for ingress and egress traffic inspection layers 2 through 7

Interrogated SandBOX

Multiple sandbox technologies with support for client specific image testing

LogBOSS™

Log collection and event identification

MailBOSS™

Mail anomaly and attack detection and mitigation

Mobile Dashboard

Mobile Apps for dashboard access and reporting

 

24 hour Monitoring and Support

Anywhere, anytime, all the time.

24 hour Monitoring and Support is a managed service

PacketShading™

Exploited file protection

Security Operation

Automated security operations, event analysis, and triage and remediation

Security Operation is a managed service

ShadowBOX™

Exploited connection protection

Shared Intelligence

Repository access aggregated across use cases

Threatrospective™

Dashboard for reporting on attacks prevented and threats prevailing within the organization

WebBOSS™

User reporting for web activity based on category and reputation and volume

Automated IR

Auto Response for triage and remediation of breached systems, networks, hosts as well as infected endpoints.

Breach Detection

Identify and validate alarms for endpoint activity using automation and orchestration engine.

Business Intelligence

Whether it is credit card records, financial information, or highly sensitive intelligence documents, we have the expertise and track record to protect and manage all of your data assets.

Community Apps

Open-source integrated components.

Cyber Intelligence

By helping an organization move away from a fragmented or compartmentalized risk management framework, we bring the proven methodology and guidance that is necessary to implement effective risk mitigation strategy.

Cyber Intelligence is a managed service

Dashboard

Customizable dashboards for reporting and visualization

Secure Data Center

Our new Tier 3+ data center in downtown Chicago has enabled us to provide absolute reliability and assurance that your data assets are always highly secured and available.

Secure Data Center is a managed service

DNSBOSS™

DNS Activity monitor for activity to and from known malicious hosts or outside baseline of approved DNS server list

FireBOSS™

Contextual search and reporting

FlowBOSS™

Netflow collection, normalization, and event detection

Incidence Response

With our response management capabilities we stand ready to support your organization in both planning for future attacks as well as dealing with current activity.

Incidence Response is a managed service

Interrogated DNS

Combines advanced cyber-threat behavior analysis, packet classification and assessment, with cyber intelligence networks.

Interrogated POP

Last hop service for ingress and egress traffic inspection layers 2 through 7

Interrogated SandBOX

Multiple sandbox technologies with support for client specific image testing

LogBOSS™

Log collection and event identification

MailBOSS™

Mail anomaly and attack detection and mitigation

Mobile Dashboard

Mobile Apps for dashboard access and reporting

24 hour Monitoring and Support

Anywhere, anytime, all the time.

24 hour Monitoring and Support is a managed service

PacketShading™

Exploited file protection

Security Operation

Automated security operations, event analysis, and triage and remediation

Security Operation is a managed service

ShadowBOX™

Exploited connection protection

Shared Intelligence

Repository access aggregated across use cases

Threatrospective™

Dashboard for reporting on attacks prevented and threats prevailing within the organization

WebBOSS™

User reporting for web activity based on category and reputation and volume

 

System Architecture

Cisco helps their customers address security challenges through an architectural approach, but it still requires an investment in operations – leading to more cost and higher time-to-detection.

5thColumn’s products integrate seamlessly with Cisco technology to address this effectively, and create an automated, extensible threat correlation system

 
Remediation / Workflow Response Engine 5Automated, self-learning response engine Remediation by heu-ristic workflow & self learning Bolt-on AR5 TM SYSlog DFlow / SPAN Alert / Event PacketREVOLVERData collection and aggregation TM Incoming andoutgoing signal API / CISCO PX Grid SF / Estreamer AMP 4E OpenDNS TGrid INTERROGATEDNetworksCyber intelligence engine TM Intel: Hash IP domain artifact SandBOX Intelligence Base Files Suspected Content Observables Remediation / Workflow Data visualization and client dashboard BOSS TM
 

We have years of experience with a reputation of guaranteed security, so we understand what it takes to create results.

 

Turnkey
deployment

Operational within hours, effective within minutes, and no custom integration work for customers.


Customer improvements
after 12 months

Malware within the enterprise is reduced on average over 1700%, with a 99.9% improvement for malware catch rate.


Outcome oriented solutions forging lasting client relationships

27x7x365 customer service + business driven analytics = 99% retention rate & 300% organic growth..


Operational within hours, effective within minutes, and no custom integration work for customers.

Malware within the enterprise is reduced on average over 1700%, with a 99.9% improvement for malware catch rate.

27x7x365 customer service + business driven analytics = 99% retention rate & 300% organic growth.

Average response time is less than one minute

99% catch rate for targeted threat activity

Detection time for malware dropped 800%

1,000,000 packets per second analyzed

 

Take action

Are you prepared for the future?

Let us advance your enterprise to the next level of data security and cyber-threat management.


Get an over the phone assessment of your network today.

Learn More