INTEGRATED
SECURITY

We are focused on next-generation cyber-threat protection and enterprise data security products to ensure your data is available, resilient, and secure.

5thColumn Logo

INTEGRATED SECURITY

We are focused on next-generation cyber-threat protection and enterprise data security products to ensure your data is available, resilient, and secure.

 
 

Core Products

With the ability to be fully managed or self managed, we have the tools, interfaces, and knowledge to ensure your business is protected from cyber threats and your IT infrastructure is operating at the optimal state.

 
 

INTERROGATED
Networks™

 

Cyber intelligence
engine

Cyber intelligence engine that provides client and vertical specific intelligence along with root cause detection

  • Highest quality Intelligence
  • Targeted Intelligence (client and vertical specific)
  • Threatrospective Analysis
  • Root Cause Detection and Triage
 

BOSS™
 

 

Big-data analytics and
visualization engine

Security orchestration platform that provides next-generation cyber-threat management, intelligence, and automated response

  • Full Packet Capture
  • Data Normalization
  • Modular Features with Software Architecture
 

CYBER
Warranty

 

Ongoing monitoring of cyber security risk

Provides ongoing monitoring of cyber security risk, covering the cost of 5thColumn’s professional services required to remedy the breach.

  • Covers the cost required to remedy the breach
  • Coverage for defense costs and settlements in a data breach
  • Coverage is determined by a contract
  • Unlimited Coverage
 

INTERROGATED Networks™

Cyber intelligence
engine

INTERROGATED Networks™ is a cyber intelligence engine that provides client and vertical specific intelligence along with root cause detection

  • Highest quality Intelligence
  • Targeted Intelligence (client and vertical specific)
  • Threatrospective Analysis
  • Root Cause Detection and Triage


BOSS™
 

Big-data analytics and
visualization engine

BOSS™ is a security orchestration platform that provides next-generation cyber-threat management, intelligence, and automated response

  • Full Packet Capture
  • Data Normalization
  • Modular Features with Software Architecture


Cyber Warranty
 

Ongoing monitoring of cyber ecurity risk

Provides ongoing monitoring of cyber ecurity risk, covering the cost of 5thColumn’s professional services required to remedy the breach.

  • Covers the cost required to remedy the breach
  • Coverage for defense costs and settlements in a data breach
  • Coverage is determined by a contract
  • Unlimited Coverage

 
 

Components and Capabilities

Our central knowledge plane, called BOSS™, allows you to progressively manage your defensive strategy, products, technologies, and dynamically adjust/tune them based on the latest and most sophisticated threat intelligence available.

 
 

PacketREVOLVER™

Single data collection and aggregation solution that provides normalization and many modular features. Provides real-time monitoring view, scheduled reporting, trigger based actionable alerts, ultra-scalable cluster architecture.

Breach Detection

Identify and validate alarms for endpoint activity using automation and orchestration engine.

Business Intelligence

Whether it is credit card records, financial information, or highly sensitive intelligence documents, we have the expertise and track record to protect and manage all of your data assets.

Community Apps

Open-source integrated components.

Cyber Intelligence

By helping an organization move away from a fragmented or compartmentalized risk management framework, we bring the proven methodology and guidance that is necessary to implement effective risk mitigation strategy.

Cyber Intelligence is a managed service

Dashboard

Customizable dashboards for reporting and visualization

Secure Data Center

Our new Tier 3+ data center in downtown Chicago has enabled us to provide absolute reliability and assurance that your data assets are always highly secured and available.

Secure Data Center is a managed service

DNSBOSS™

DNS Activity monitor for activity to and from known malicious hosts or outside baseline of approved DNS server list

 

FireBOSS™

Contextual search and reporting

FlowBOSS™

Netflow collection, normalization, and event detection

Incidence Response

With our response management capabilities we stand ready to support your organization in both planning for future attacks as well as dealing with current activity.

Incidence Response is a managed service

Interrogated DNS

Combines advanced cyber-threat behavior analysis, packet classification and assessment, with cyber intelligence networks.

Interrogated POP

Last hop service for ingress and egress traffic inspection layers 2 through 7

Interrogated SandBOX

Multiple sandbox technologies with support for client specific image testing

LogBOSS™

Log collection and event identification

MailBOSS™

Mail anomaly and attack detection and mitigation

Mobile Dashboard

Mobile Apps for dashboard access and reporting

 

Support

Anywhere, anytime, all the time.

Support is a managed service

PacketShading™

Exploited file protection

Security Operation

Automated security operations, event analysis, and triage and remediation

Security Operation is a managed service

ShadowBOX™

Exploited connection protection

Shared Intelligence

Repository access aggregated across use cases

Threatrospective™

Dashboard for reporting on attacks prevented and threats prevailing within the organization

WebBOSS™

User reporting for web activity based on category and reputation and volume

PacketREVOLVER™

Single data collection and aggregation solution that provides normalization and many modular features. Provides real-time monitoring view, scheduled reporting, trigger based actionable alerts, ultra-scalable cluster architecture.

Breach Detection

Identify and validate alarms for endpoint activity using automation and orchestration engine.

Business Intelligence

Whether it is credit card records, financial information, or highly sensitive intelligence documents, we have the expertise and track record to protect and manage all of your data assets.

Community Apps

Open-source integrated components.

Cyber Intelligence

By helping an organization move away from a fragmented or compartmentalized risk management framework, we bring the proven methodology and guidance that is necessary to implement effective risk mitigation strategy.

Cyber Intelligence is a managed service

Dashboard

Customizable dashboards for reporting and visualization

Secure Data Center

Our new Tier 3+ data center in downtown Chicago has enabled us to provide absolute reliability and assurance that your data assets are always highly secured and available.

Secure Data Center is a managed service

DNSBOSS™

DNS Activity monitor for activity to and from known malicious hosts or outside baseline of approved DNS server list

FireBOSS™

Contextual search and reporting

FlowBOSS™

Netflow collection, normalization, and event detection

Incidence Response

With our response management capabilities we stand ready to support your organization in both planning for future attacks as well as dealing with current activity.

Incidence Response is a managed service

Interrogated DNS

Combines advanced cyber-threat behavior analysis, packet classification and assessment, with cyber intelligence networks.

Interrogated POP

Last hop service for ingress and egress traffic inspection layers 2 through 7

Interrogated SandBOX

Multiple sandbox technologies with support for client specific image testing

LogBOSS™

Log collection and event identification

MailBOSS™

Mail anomaly and attack detection and mitigation

Mobile Dashboard

Mobile Apps for dashboard access and reporting

Support

Anywhere, anytime, all the time.

Support is a managed service

PacketShading™

Exploited file protection

Security Operation

Automated security operations, event analysis, and triage and remediation

Security Operation is a managed service

ShadowBOX™

Exploited connection protection

Shared Intelligence

Repository access aggregated across use cases

Threatrospective™

Dashboard for reporting on attacks prevented and threats prevailing within the organization

WebBOSS™

User reporting for web activity based on category and reputation and volume

 

System Architecture

Cisco helps their customers address security challenges through an architectural approach, but it still requires an investment in operations – leading to more cost and higher time-to-detection.

5thColumn’s products integrate seamlessly with Cisco technology to address this effectively, and create an automated, extensible threat correlation system

 
Remediation / Workflow Response Engine 5Automated, self-learning response engine Remediation by heu-ristic workflow & self learning Bolt-on AR5 TM SYSlog DFlow / SPAN Alert / Event PacketREVOLVERData collection and aggregation TM Incoming andoutgoing signal API / CISCO PX Grid SF / Estreamer AMP 4E OpenDNS TGrid INTERROGATEDNetworksCyber intelligence engine TM Intel: Hash IP domain artifact SandBOX Intelligence Base Files Suspected Content Observables Remediation / Workflow Data visualization and client dashboard BOSS TM
 

We have years of experience with a reputation of guaranteed security, so we understand what it takes to create results.

 

Turnkey
deployment

Operational within hours, effective within minutes, and no custom integration work for customers.


Customer improvements
after 12 months

Malware within the enterprise is reduced on average over 1700%, with a 99.9% improvement for malware catch rate.


Outcome oriented solutions forging lasting client relationships

27x7x365 customer service + business driven analytics = 99% retention rate & 300% organic growth..


Operational within hours, effective within minutes, and no custom integration work for customers.

Malware within the enterprise is reduced on average over 1700%, with a 99.9% improvement for malware catch rate.

27x7x365 customer service + business driven analytics = 99% retention rate & 300% organic growth.

Average response time is less than one minute

99% catch rate for targeted threat activity

Detection time for malware dropped 800%

1,000,000 packets per second analyzed

 

Take Action Now

If you have any doubts about your business network security stance then consider taking action today.

Learn more:

 

See our core products and integrated security capabilities

Learn about industry-backed cyber security coverage

 
 

Manage your cyber security from one dashboard

Advanced cyber-threat protection for your network

 

See what to expect from us

Seeing is believing. Give us a try.


 
 
 

Learn More