Our products and services have helped customers experience:
Alert Handling Capacity
Automated incident distribution, routing, and
follow up enables higher volume handling
Regular and ad hoc reports through
automation makes timely reporting a non-issue
Quarantined Email Release Time
Automated email incident assignment, efficient
release by business after documenting rationale
Seamless involvement of business in
incident management improves SLA performance
An add-on to your existing DLP systems that helps in resolving DLP incidents quickly and efficiently with customized remediation workflows and process orchestration.Learn More
Unified Management Console (UMC)
A secure and scalable, specialty middleware that pulls in near real-time data from various monitoring tools to customizable role-specific dashboards.Learn More
Policy Governance Workflow
Enables business stakeholders to review and recommend changes in policies.Learn More
Email Quarantine Workflow
Automatically routes quarantined emails for timely review and release by business teams.Learn More
DLP Implementation & Policy Finetuning
Expert service to seamlessly implement your new Data Loss Prevention software or finetune policies of your existing DLPs for improved security.
Expert service to integrate disparate products into seamless solutions using a variety of automation and orchestration tools.
Get real-time visibility into various threat vectors and attacks that are active in your endpoints and network devices with the help of existing EDR/XDR technologies.
Our Threat Hunters can apply a focused and iterative approach to detect and remove cyber threats that may have evaded traditional security tools.
A smart tool that works in the background and captures video evidence of incidents for later investigation by cyber forensics professionals.
Encrypt emails with sensitive data for PCI compliance without having to quarantine or delete the emails.
Make your business stronger with DashMagiq™
The Data Loss Prevention (DLP) system of a large bank produced very large number of incidents. The Info Security team of the bank was overwhelmed with the surge of incidents and wanted a way to automate the remediation process workflow for efficiency. DashMagiq™ DLP Workflow was deployed to automatically distribute and route the incidents to the authorized managers and other stakeholders based on custom rules. Using DashMagiq™ business groups with no technical skills on DLP software, could investigate and remediate the incidents. DashMagiq™ DLP Workflow made it possible for the bank to optimize incident remediation cost and efficacy by effective routing and quick resolution. With DashMagiq™, incidents are tracked from creation to closure.
Business leaders in a large financial institution were upset because critical business emails were getting blocked by the DLP. DashMagiq™ Email Quarantine Workflow was deployed to enable the business groups to review their quarantined emails and release after adding their comments to the incident. When an email is quarantined, DashMagiq™ automatically alerts the sender’s manager (or a specific stakeholder) whose responses drive the deletion or release of the email. Email Quarantine Workflow made it possible for business teams to quickly and seamlessly review and take decisions on quarantined emails while the DLP managers were able to retain strong DLP email policies to mitigate the risks.
A large bank needed a method for business groups to review and recommend edits to DLP policies that impact them. DashMagiq™ Policy Governance Workflow does that and more for them. It provides a workflow that enables business to select specific policies and recommend edits. After a policy edit is approved by the policy owner, DashMagiq™ RPA bots automatically update the policy in the DLP solution’s console. If any policy edits are done by a user directly in the DLP solution, DashMagiq™ reports that as a potential unapproved edit. Audit trail for all DLP policy updates is maintained automatically. This was critical for the bank’s compliance to the standards set by the central bank. Policy Governance Workflow is also called automated Maker Checker Workflow for policy updates.
A large telecom giant had invested in various Cyber Defence monitoring services for independent real time feeds that the IT team summarized and formatted according to the needs of the management. However, these reports had to be changed repeatedly depending on the situation and the level of management demanding the information. This took a lot of time, and the report was usually out-of-date by the time it was presented to the management. DashMagiq™ Unified Management Console (UMC) was deployed to provide a unified dashboard that automatically merged the numerous feeds into a variety of near-real-time reports that made sense to the manager logged into the UMC. Custom layouts and drill down data dimensions in the dashboards help serve information to the right roles at the right time with the right granularity.
A large enterprise wanted to have a holistic picture of their patch compliance; they also wanted to extend their Patch Management Product to handle Ubuntu and Debian systems as well. DashMagiq™ Patch Management Compliance product was deployed to automate the patch compliance process. The solution used the customer’s existing vulnerability scanner, Patch Management software, and patching process to provide a complete patching process orchestration. DashMagiq™ patch agents extended the patching capabilities of their existing Patch Management software to include Ubuntu and Debian systems. DashMagiq™ Unified Management Console provided a single screen to manage and report everything related to the compliance process. DashMagiq™ made it easy for even junior resources to run the patching process.
A large BPO wanted to run surprise drills to check if their employees were alert to ransomware attacks. Ransomware Simulator tool from DashMagiq™ Risk Mitigation Toolbox simulated a ransomware attack for 5-10 seconds and then released the victim’s computer. For the drill, the IT team mimicked the methods used by hackers to trap victims. The report generated by Ransomware Simulator enabled the organization to provide focused retraining for the employees who fell into the trap during the drill.
A large enterprise wanted to track the vulnerabilities detected by their Vulnerability scanner in their existing Ticketing system. Vidyatech developed a middleware framework to integrate the cybersecurity product with the ticketing system to enable seamless communication between the two systems.