CimTrak provides a historical configuration setting to establish a chain of evidence and root of trust. CimTrak’s real-time change detection and response technology provides a closed-loop change control system that covers everything from servers and desktops to cloud configurations, hypervisors, container orchestration, databases, and more. CimTrak's built-in ticketing system can be used standalone or in unison with leading ITSM vendors to capture authorized work orders to reconcile expected changes with observed leaving unwanted and unexpected changes highlighted for review and/or remediation.
CimTrak provides manual or automated roll-back capability as well as change prevention for those files, directories or configurations that should never change. CimTrak also provides both black and whitelisting correlation, STIX/TAXII feeds and file reputation services to provide more contextual information to help identify what should and should not be running in your environment.
Given CimTrak’s patented real-time change detection capability, immediate notification and remediation options are available to ensure that any potential threat, both internal and external, does not permeate throughout the organizations. CimTrak’s mean time to detect (MTTD) malicious and unwanted changes is measured in minutes as opposed to the industry average of 206 days.
CimTrak monitors and reports in real-time
change activity from a trusted and secure
baseline and provides forensic details and
analysis to investigate unauthorized changes
CimTrak has the capability of restricting and
preventing access and changes to systems
files, directories, and other critical operating
components and reporting forensic level data.
CimTrak can scan and detect vulnerabilities
utilizing threat intelligence feeds as well as
white/blacklisting cloud services.