Use https://seceonhelp.freshdesk.com/support/login to access updated Knowledge Base Articles, Submit Technical Support Tickets and Review Status of submitted support tickets.

Seceon Hardware Specifications

Seceon Open Threat Management Platform

Seceon’s OTM Platform makes the best out of available information and intelligence from various digital assets – guided by ML-based behavioural analytics and AI-based decision-making – to raise and eliminate only the qualified cyber security threats, proactively and confidently.

 

 

 

 

 

 

Seceon OTM Key Components

Control & Collection Engine (CCE)

The CCE orchestrates a collection of events and network traffic data across assets deployed within the enterprise and cloud. It applies intelligent detection for the enrichment of structured and unstructured data before routing to the OTM core through a secure connection.

Hardware Specs for CCE Server Setup

CCE Server Setup on Azure Environment

CCE Server Setup on Oracle VM VirtualBox

CCE Server Setup on VMWare

CCE Server Setup on AWS Environment

 

Analytics and Policy Engine (APE)

The APE forms the core of OTM and processes high-volume high-velocity data in real-time while feeding threat intelligence, behavioural anomalies, historical context and vulnerability scan results to dynamic threat models driven by actionable AI and ML-based correlation. Remediation routes can be selected with minimal intervention or full automation for threat containment.

Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR) is an integrated, layered approach to endpoint protection that combines real-time continuous monitoring and endpoint data analytics with a rule-based automated response.

aiXDR Server

The aiXDR Server orchestrates data collection across each tenant, in a multi-tenant environment and relegates specific instructions to the aiXDR agents in communication with the APE.

EDR Agent

The lightweight agent resides on each endpoint with the objective of gathering specific information on applications, processes, file events, executables, user access, telemetry etc. Also, it renders threat containment and elimination on the endpoint triggered by remediation policy.

 

Also, check the number of ports required to allow for communication using below given link:
OTM: Pre-install-Port Requirements

 

 

 

 

Seceon Inc. All rights reserved. https://www.seceon.com