Core Products

With the ability to be fully managed or self-managed, we have the tools, interfaces, and knowledge to ensure your business is protected from cyber threats and your IT infrastructure is operating at the optimal state.

 
 

INTERROGATED
Networks™

Cyber intelligence
engine

Cyber intelligence engine that provides client and vertical specific intelligence along with root cause detection

Highest quality Intelligence

Targeted Intelligence (client and vertical specific)

Threatrospective Analysis

Root Cause Detection and Triage

 

BOSS™
 

Big-data analytics and
visualization engine

Security orchestration platform that provides next-generation cyber-threat management, intelligence, and automated response

Full Packet Capture

Data Normalization

Modular Features with Software Architecture

 

CYBER
Warranty

Ongoing monitoring
of cyber security risk

Provides ongoing monitoring of cyber security risk, covering the cost of 5thColumn’s professional services required to remedy the breach.

Covers the cost required to remedy the breach

Coverage for defense costs and settlements in a data breach

Coverage is determined by a contract

Unlimited Coverage

 

INTERROGATED Networks™

Cyber intelligence
engine

INTERROGATED Networks™ is a cyber intelligence engine that provides client and vertical specific intelligence along with root cause detection

  • Highest quality Intelligence
  • Targeted Intelligence (client and vertical specific)
  • Threatrospective Analysis
  • Root Cause Detection and Triage


BOSS™
 

Big-data analytics and
visualization engine

BOSS™ is a security orchestration platform that provides next-generation cyber-threat management, intelligence, and automated response

  • Full Packet Capture
  • Data Normalization
  • Modular Features with Software Architecture


Cyber Warranty
 

Ongoing monitoring of cyber ecurity risk

Provides ongoing monitoring of cyber ecurity risk, covering the cost of 5thColumn’s professional services required to remedy the breach.

  • Covers the cost required to remedy the breach
  • Coverage for defense costs and settlements in a data breach
  • Coverage is determined by a contract
  • Unlimited Coverage

 
 

Components and Capabilities

Our central knowledge plane, called BOSS™, allows you to progressively manage your defensive strategy, products, technologies, and dynamically adjust/tune them based on the latest and most sophisticated threat intelligence available.

 
 

PacketREVOLVER™

Single data collection and aggregation solution that provides normalization and many modular features. Provides real-time monitoring view, scheduled reporting, trigger based actionable alerts, ultra-scalable cluster architecture.

Breach Detection

Identify and validate alarms for endpoint activity using automation and orchestration engine.

Business Intelligence

Whether it is credit card records, financial information, or highly sensitive intelligence documents, we have the expertise and track record to protect and manage all of your data assets.

Community Apps

Open-source integrated components.

Cyber Intelligence

By helping an organization move away from a fragmented or compartmentalized risk management framework, we bring the proven methodology and guidance that is necessary to implement effective risk mitigation strategy.

Cyber Intelligence is a managed service

Dashboard

Customizable dashboards for reporting and visualization

Secure Data Center

Our new Tier 3+ data center in downtown Chicago has enabled us to provide absolute reliability and assurance that your data assets are always highly secured and available.

Secure Data Center is a managed service

DNSBOSS™

DNS Activity monitor for activity to and from known malicious hosts or outside baseline of approved DNS server list

 

FireBOSS™

Contextual search and reporting

FlowBOSS™

Netflow collection, normalization, and event detection

Incidence Response

With our response management capabilities we stand ready to support your organization in both planning for future attacks as well as dealing with current activity.

Incidence Response is a managed service

Interrogated DNS

Combines advanced cyber-threat behavior analysis, packet classification and assessment, with cyber intelligence networks.

Interrogated POP

Last hop service for ingress and egress traffic inspection layers 2 through 7

Interrogated SandBOX

Multiple sandbox technologies with support for client specific image testing

LogBOSS™

Log collection and event identification

MailBOSS™

Mail anomaly and attack detection and mitigation

Mobile Dashboard

Mobile Apps for dashboard access and reporting

 

Support

Anywhere, anytime, all the time.

Support is a managed service

PacketShading™

Exploited file protection

Security Operation

Automated security operations, event analysis, and triage and remediation

Security Operation is a managed service

ShadowBOX™

Exploited connection protection

Shared Intelligence

Repository access aggregated across use cases

Threatrospective™

Dashboard for reporting on attacks prevented and threats prevailing within the organization

WebBOSS™

User reporting for web activity based on category and reputation and volume

PacketREVOLVER™

Single data collection and aggregation solution that provides normalization and many modular features. Provides real-time monitoring view, scheduled reporting, trigger based actionable alerts, ultra-scalable cluster architecture.

Breach Detection

Identify and validate alarms for endpoint activity using automation and orchestration engine.

Business Intelligence

Whether it is credit card records, financial information, or highly sensitive intelligence documents, we have the expertise and track record to protect and manage all of your data assets.

Community Apps

Open-source integrated components.

Cyber Intelligence

By helping an organization move away from a fragmented or compartmentalized risk management framework, we bring the proven methodology and guidance that is necessary to implement effective risk mitigation strategy.

Cyber Intelligence is a managed service

Dashboard

Customizable dashboards for reporting and visualization

Secure Data Center

Our new Tier 3+ data center in downtown Chicago has enabled us to provide absolute reliability and assurance that your data assets are always highly secured and available.

Secure Data Center is a managed service

DNSBOSS™

DNS Activity monitor for activity to and from known malicious hosts or outside baseline of approved DNS server list

FireBOSS™

Contextual search and reporting

FlowBOSS™

Netflow collection, normalization, and event detection

Incidence Response

With our response management capabilities we stand ready to support your organization in both planning for future attacks as well as dealing with current activity.

Incidence Response is a managed service

Interrogated DNS

Combines advanced cyber-threat behavior analysis, packet classification and assessment, with cyber intelligence networks.

Interrogated POP

Last hop service for ingress and egress traffic inspection layers 2 through 7

Interrogated SandBOX

Multiple sandbox technologies with support for client specific image testing

LogBOSS™

Log collection and event identification

MailBOSS™

Mail anomaly and attack detection and mitigation

Mobile Dashboard

Mobile Apps for dashboard access and reporting

Support

Anywhere, anytime, all the time.

Support is a managed service

PacketShading™

Exploited file protection

Security Operation

Automated security operations, event analysis, and triage and remediation

Security Operation is a managed service

ShadowBOX™

Exploited connection protection

Shared Intelligence

Repository access aggregated across use cases

Threatrospective™

Dashboard for reporting on attacks prevented and threats prevailing within the organization

WebBOSS™

User reporting for web activity based on category and reputation and volume

 

Take Action Now

If you have any doubts about your business network security stance then consider taking action today.

Learn more:




 

Manage your cyber security from one dashboard

Advanced cyber-threat protection for your network

 
 

See our core products and integrated security capabilities