Video: Hear About opCharts Enterprise Services

Re-imagining network monitoring with Enterprise Services Monitoring on opCharts

Providing visibility & answering Executive questions

Enterprise Services Monitoring is a major enhancement to FirstWave’s industry-leading network management platform (NMIS) that is designed to provide monitoring and alerting systems that put the focus on business performance rather than technology.

The Enterprise Services Monitoring extension to NMIS’ infrastructure visualization platform, opCharts, re-imagines monitoring for IT networks and services and allows administrators and management to monitor and provide alerts based on the genuine business impacts, while drilling down for root cause identification in a single click.

But what does it mean and how does it work?

Video: Hear About opCharts Enterprise Services

The Challenge: Where do you start looking when something goes wrong in your organization?

Modern organizations rely on networked applications to succeed. In these complex environments, with multiple connected devices working together to support your applications, how do you maintain visibility of all of these critical services, and the infrastructure they depend on?
Enterprise Services monitors a collection of resources delivering customer and business services, such as:

  • Customer-facing website or portals
  • Business critical applications or SaaS tools
  • Service Provider network solutions to customers

The Solution: Single-click root cause identification of issues.

Enterprise Services improves business outcomes through reducing mean time to resolve (MTTR). It monitors the service end-to-end, not just node or devices health, and saves the pain-staking process often required to bridge the gap from service impact to root cause.

  • One-click drill down to identify root cause
  • Real-time representation providing context to your complete network
  • Real-time monitoring and alerting of service status, not just node or device health
  • Top-down view, rather than traditional bottom-up

Enterprise Services Monitoring from FirstWave

If you want to see the power of single-click root cause identification and understand how FirstWave can help you reduce MTTR, reach out to our team for a personalized demo today.

Uncategorized

Open Security Management Platform (OSMP) Delivers On “Urgent” Need For SMB Cyber Protection

Comprehensive cyber protection for SMBs has emerged as the next great revenue driver for IT service providers, with 60% of SMBs looking to outsource cybersecurity to a third party, according to a new report by Frost & Sullivan.

The report, commissioned by ASX-listed global cybersecurity company FirstWave Cloud Technology, showed SMBs were in “urgent” need of comprehensive cyber protection and were increasingly relying on managed service providers to deliver unified, centralised and automated solutions that offer enhanced threat remediation.

“Security, though a priority, often slips through the cracks, making it difficult to intentionally and continuously establish a security-forward organisational stance from their IT service providers,” the report said.

To fill this gap, FirstWave developed the CyberCision™ Open Security Management Platform (OSMP), described by Frost & Sullivan as the first of its kind. Designed to equip service providers with low-cost, high-revenue security services for their SMB customers, the platform enables SMB customers, in turn, to benefit from an enterprise-grade Cybersecurity-as-a-Service solution.

FirstWave CEO Danny Maher said it was no secret that cybersecurity had become one of the most pressing issues for businesses of all sizes, particularly SMBs.

“With high-profile data breaches making headlines on an almost weekly basis, it is clear that traditional security measures are no longer enough to protect organisations from sophisticated cyber attacks,” he said.

“As a result, more and more businesses are turning to outsourcing as a way to improve their cybersecurity posture. Those service providers need to have a solution ready for their customers.”

SMBs’ Unique Cybersecurity Challenges 
The global upheaval of the last two years that disrupted societies, governments, businesses, and the technologies that support them, also forced organisations worldwide to shift to remote working practically overnight. Consequently, organisations have adopted new operational infrastructures as data has multiplied exponentially—all opening up a much wider attack surface.

Moreover, cyberattacks have grown smarter, scaling in both sophistication and speed, to penetrate the weak defences of solutions struggling to protect increasingly digital economies.

A recent Frost & Sullivan survey of SMBs found most were targeted by preventable threats, including ransomware (47%), vulnerabilities from unpatched systems (44%), web defacements (43%), insider threats from employees (31%), and phishing attacks (27%).

The Opportunity For Service Providers
Frost & Sullivan finds that while only 14% of enterprises report outsourcing more than half of their cybersecurity operations, a much higher percentage (60%) of SMBs outsource.

“This presents a natural fit for partnerships between SMBs and their service providers. By adding cybersecurity to their existing services, SMBs can bolster existing connectivity assets with the critical protections they need, all through a single provider,” the report said.

However, for many service providers, while lucrative, delivering cybersecurity solutions to enterprise customers can involve significant cost and complexity. FirstWave’s world-first OSMP, CyberCision™, was explicitly designed to address this problem.

“CyberCision™ enables service providers to provision enterprise-grade security services to enterprise and SMB customers at scale, opening the door to new revenue opportunities with a lower cost-to-serve,” the report said.

“With CyberCision™, service providers can build as-a-service cybersecurity packages of enterprise-grade, including a range of management and operational services such as multi-tenanting, billing, and provisioning that enable them to streamline the sales and delivery process at a minimal cost.”

Essentially, CyberCision™ serves as a platform that service providers can depend on to scale their managed security services business and operations profitably, drastically reducing the time to market for cybersecurity and serving SMB customers, which was not previously possible.

​Download a free copy of the Frost & Sullivan report, Embracing Delivery of Cybersecurity and Scaling Via Service Providers

Uncategorized

CyberCision Mobile App: Visibility and Real-time Monitoring of Cybersecurity Threats

Cybersecurity threats are on the rise and businesses need to be taking steps to protect themselves. Our CyberCision Mobile App offers Visibility and real-time monitoring of cyber-security threats so that you can rest assured that your business is safe. With our app, you can also access historic reporting, all available to be white-labelled for our Partners.

Released as part of our Phase II CyberCision Launch, the CyberCision Mobile App offers unparalleled visibility into the cyber-security threats facing businesses today. With real-time monitoring and historic reporting, the app provides clients with a comprehensive view of the risks they face. Available to be white-labelled for service providers and telco partners, this powerful app gives visibility and control to those who need it to stay ahead of the cyber-criminals.

For End Users

With the tap of a finger, end users are able to review current and historic incidents within their email security posture in the palm of their hand, including real-time alerting to ensure any urgent matters are addressed instantly. This allows businesses to quickly identify and resolve any potential issues before they become damaging breaches. In addition, the ability to review past incidents helps businesses to learn and adapt, helping to prevent future attacks.

For Service Providers

Eliminating the need to replicate app development work, our platform is fully customisable for our service provider and telco partners. This allows you to put these powerful tools into your customer’s hands, branded as your own. What’s more, this added visibility helps to reinforce the value of the email security offering in place, so you can lead informed conversations with your customers about how to best protect their business from cybersecurity threats.

Uncategorized

Deploying email security at scale and speed with Frictionless Email Security

Cybersecurity has always been a tough sell. It’s an intangible product that’s often seen as a necessary evil – something that businesses have to invest in, but don’t really want to think about. This is especially true when it comes to deployments at scale. Imagine trying to sell cyber security to thousands of Microsoft 365 customers. Not only do you have to convince them of the need for the product, but you also have to ensure that it’s properly deployed across their entire organization. This is no small feat, and it’s one that service providers have been struggling with for years.

That’s where FirstWave comes in. Our CyberCision platform is the world’s first open cyber security platform, made specifically to help service providers and telcos provide cybersecurity solutions to their customers. CyberCision is committed to making email security as seamless and painless as possible for its customers. That’s why we’re excited to offer our new Frictionless Email Security solution. This automated activation method enables service providers and Microsoft customers to deploy email security at scale and at speed, without manual DNS and MX changes. That means you can rest assured that your emails are protected from viruses, phishing attacks, and other cyber threats.

Frictionless Email Security on FirstWave’s CyberCision platform:

  • Deploys in minutes
  • Provides extra layers of protection
  • There is no MX record to change
  • It is advanced security out of the box
  • Rapidly onboards thousands of customers with APIs
  • Service Providers can white label the platform to support their brand
  • And includes ADR to mitigate targeted email attacks in the mailbox

Service providers simply log in to the CyberCision platform and follow the prompts to activate the service. It’s that easy! So if you’re looking for an email security solution that won’t cause headaches, look no further than CyberCision. We’ll take care of everything for you.

​Finally, service providers and telcos can onboard email security customers at scale, at speed, and with
minimal effort, opening new channels to market.

Uncategorized

Frictionless Email Security: The Solution to Onboarding Email Security

In the race to stay ahead of the latest cybersecurity threats, email security is more important than ever. However, traditional methods of onboarding email security solutions have been slow and costly, preventing many businesses from implementing these vital protections. CyberCision from FirstWave changes all that with Frictionless Email Security. This innovative new approach removes the barriers to onboarding email security, making it easier and faster for service providers and telcos to add these essential protections to their customers’ networks. With Frictionless Email Security, you can be confident that your business is protected from the latest threats!

Email is one of the most important communications tools for businesses, so it’s essential to have a secure platform in place. However, onboarding customers to an email security platform can be time-consuming and fraught with potential for human error. In the past, service providers have had to dedicate significant amounts of time, often after hours, from senior technical staff to make manual changes to DNS and MX records. Even with the best intentions, there’s always the chance that something will go wrong.
Between the finite ‘change windows’ available after hours for service providers to lean on their senior staff before burning them out, and the additional cost this incurs and will almost certainly need to be passed onto their customers, traditional email security onboard is full of barriers.

That’s where FirstWave’s Frictionless Email Security comes into its own. With automated activation, not beholden to manual DNS and MX record changes, as well as API integrations to enable the ability to deploy at scale, FirstWave empowers service providers and telcos to deploy world-class email security to their customers with ease.
​
Finally, service providers and telcos can onboard email security customers at scale, at speed, and with minimal effort, opening new channels to market.

Uncategorized

Finding Devices With Custom Queries in Open-AudIT

When considering what a typical network is and what is monitored in it, a few devices usually come to mind; Switches, Routers, HUBs, etc. With the advent of the Internet of Things (IoT) the variety of monitored devices is increasing even further, adding IoT devices such as thermostats along with the devices that regulate them (Microcontrollers, Single-Board-Computers, etc.). 

Without having inventory management software, it becomes challenging to keep track of where and what devices are on your network. Opmantek’s Open-AudIT software not only provides in-depth network auditing; it is also easy to create custom queries with this information. These queries allow you to find and organize devices in whatever manner you or your team find best.

Open-AudIT used as a configuration management database system (one of its many uses) ships with 33 pre-built queries to assist in finding and organizing devices. These queries range from what memory and processors are used, what software is currently installed, to what IP addresses are consumed on the network. 

Understanding that no two networks or organizations are alike, there is a need to have the ability to customize queries to fit your team’s needs. Open-AudIT accomplishes this through the use of Custom Queries. A query is essentially a SQL statement that runs against the database to only display the requested filtered items the user has permission to view. 

A query can be created in Open-AudIT by navigating to the menu -> Manage -> Queries -> Create Queries. 

The SQL query can be broken into three parts:

1. The SELECT statement is used to select the data from a database.

The SELECT section of the query should use full dot notation and also request the field with its full dot name. For example;

SELECT system.id AS `system.id`,

system.name AS `system.name`,

`system.os_name` AS `system.os_name`

This would cause the query to display the system id’s, system name, and operating system.

2.The FROM clause lists the tables, and any joins required for the SQL statement.

The FROM clause will decide what database you are getting these specific system id’s and should only contain the tables with the attributes you need.

For example – FROM system specifies which table the system.id and system.name is coming from.

3. The WHERE clause extracts only those records that fulfil a specified condition. For Open-AudIT to apply user permissions on items, we mandate the use of the WHERE @filter. If you do not use this format, the query::create form will show a warning.

Only users with the Admin role are permitted to create queries that lack this attribute. Continuing using our earlier examples we can add the clause WHERE @filter AND system.type = ‘computer’.  Specifying the type to equal computer will only display devices that are computers quickly allowing you to filter out all other irrelevant devices. The query has now reached its final form:


SELECT system.id AS `system.id`,
system.name AS `system.name`,
system.os_name AS `system.os_name`
FROM system
WHERE @filter
AND system.type = ‘computer’


This will result in displaying only the system names, id’s, and operating systems of devices that are the system type of computer.

NOTE – You are free to select any attributes desired when creating your custom query. To further help in creating queries it is a good idea to use the menu -> Admin -> Database -> List Tables to view the specific table structure. This provides a valuable resource for finding the attributes necessary when creating any custom query.

Open-AudIT grants you the ability to scan your entire network for devices and organize them in ways that make sense for your team. Inventory management is a breeze with the ability to find, filter, and group any device using custom queries. The growing number of different devices added to networks makes having tools like Open-AudIT in your kit more valuable than ever.

For more information on FirstWave’s Open-AudIT, other FirstWave solutions, or to schedule a demonstration, please visit our website at www.firstwave.com. You can also email us at contact@firstwave.com.