top of page
Digital-workplace.jpg

ISEC7 SPHERE

A customizable and versatile technology agnostic platform for all your digital workspace and security needs.

ISEC7 SPHERE – STIG Compliant 

ISEC7 SPHERE is often compared with security information and event management (SIEM) solutions. Event log monitoring and management is only one integral component of ISEC7 SPHERE, which is used to collect, aggregate, correlate, and analyze security event data from CSfC components. Data is sent to (Syslog) or collected (SNMP, API, WMI, PowerShell, etc.) from ISEC7 SPHERE from the following sources: hardware devices, virtual machines, security appliances, and software and services running within the solution network(s). 

ISEC7 Sphere Architecture Overview

KEY BENEFITS 

  • Cross network monitoring

  • Increased data confidentiality, integrity, and availability

  • Greater visibility of security-related network events 

  • Improved network resilience, despite the ever-changing cyber threat landscape 

  • Easier tracking of hardware and software information technology assets throughout the enterprise 

  • Enhanced support for organizational change management processes

  • Immediate notifications

  • Incident triage handling & Optimization

  • Compliance Management

  • Flexibility & Future-proofing

 

ISEC7 SPHERE – STIG Compliant

An Enterprise Technology Intelligence Platform (ETIP) for Digital Workplace Monitoring and Management to Reduce the Cost of Downtime and Improve Operational Efficiencies

The ISEC7 SPHERE enables organizations to monitor their entire mobile infrastructure and network, and quickly identify and resolve issues—from one web-based, central console.

  • ​Centralized control provides large time-savings & reduction in operational costs

  • Get early detection of point-of-failures to reduce the cost for downtime & increases productivity

  • End-to-end visibility results in a better user experience & less helpdesk calls

  • Mitigate security risks & monitor compliance to avoid expensive fines

  • Detect weak network connections to plan future investments

ISEC7 Sphere continuous infrastructure monitoring

ISEC7 EMM Suite/ISEC7 SPHERE STIG Version 2 Release 1 (STIG detail)

Department of Defense (DoD) Instruction 8500.01 directs that the Defense Information Systems Agency (DISA) “develops and maintains control correlation identifiers (CCIs), security requirements guides (SRGs), security technical implementation guides (STIGs), and mobile code risk categories and usage guides that implement and are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures, with the support of the NSA/CSS, using input from stakeholders” and DoD Component heads “ensure that all DoD IT under their purview complies with applicable STIGs, security configuration guides, and SRGs.”

STIG supported versions:

​ISEC7 SPHERE v20.x - latest release 20.5.0

Remark: Apache Tomcat 8.5.x changed to version 9.0.x in latest release 20.5.x - review Apache Tomcat 9.0.x STIG 

ISEC7 CLASSIFY an ISEC7 SPHERE Enhanced Email Client & Classification Marking Solution

- Microsoft Outlook Desktop and Online Add-in v1.x - current release 1.0.11

- Microsoft Word Desktop and Online Add-in v1.x - currently in BETA

- ISEC7 MAIL (previously ISEC7 Mobile Exchange Delegate)
for Android v1.x - latest release 1.9.9

for IOS v1.x - latest release 1.9.8

Receive alerts within ISEC7 SPHERE and disseminate notifications on Common Vulnerabilities and Exposures for impacted software versions in your environment. SPHERE will provide information on the relevant CVE and mitigation details and update once a patch has been applied, ensuring that your infrastructure is up to date with the latest compliant software versions.

ISEC7 Sphere Alerts about vulnerabilities and exposures

Example of CVE monitoring results for an affected Ivanti EPMM server under ISEC7 SPHERE.

Copy of Copy of Copy of Copy of NRF2023 LINKED IN (1200 × 600 px) (4087 × 2338 px) (4087 ×

Want to Get in Touch?

Get in touch to learn more about our services, products, and partnerships and how we help government agencies with their digital transformation and keeping data safe.

Copy of Copy of Copy of Copy of NRF2023 LINKED IN (1200 × 600 px) (4087 × 2338 px) (4087 ×

Related Blog Articles

bottom of page