DeepGuardian (DG) is a Network Intrusion Detection Prevention System (NIDPS). Tailored for cloud-native environments, DG leverages AI to identify network traffic anomalies and attacks. Data security and privacy are of paramount importance for DG, which is ensured by employing the latest Privacy Enhancing Technologies (PETs).
Details
Solutions category
Govern
Cybersecurity Supply Chain Risk Management
Risk Management Strategy
Business Impact Analysis
Identify
Asset Mangement
Content Filtering & Monitoring
IT Service Management
Patch Management
Software & Security Lifecycle Management
Vulnerability Management (Analysis)
Risk Assessment
Risk Management solutions & services
Protect
Human Risk Management
Cyber Ranges
Security Awareness Trainings
Identity Management, Authentication, & Access Control
Access Management
Authentication
Authorisation
Identity Management
Intrusion & Anomaly Prevention
Platform Security
Protective Technology
Cloud Security
IoT Security
Sandboxing
Technology Infrastructure Resilience
Respond
Incident Mitigation
Cyber Security Insurance
DDoS protection
Detect
Adverse Event Analysis
Intrusion Detection
Ideal organisation type
Academia
Freelancer/sole proprietor
Large Enterprise
Other
Public administration
Research Center
Small and Medium Enterprise
Market applications
Aerospace and Defense
Agriculture and Food Industry
Automotive
Energy and Utilities
Environmental Services
Finance and Banking
Information Technology (IT)
Manufacturing
Media and Entertainment
Public Sector and Government
Telecommunications
Transportation and Logistics
Deployment mode
Cloud, SaaS, web-based
Desktop Linux
On-premise Linux
Pricing model
Custom pricing
Pay as you go
Subscription (monthly/yearly)
DevOps cycle phase
Build: Incorporating security testing during the build process to detect issues early
Code Development: Writing secure code, with built-in checks for vulnerabilities
Deploy: Deploying securely configured applications and infrastructure
Feedback and Compliance: Gathering feedback on security risks, compliance requirements, and addressing any incidents or vulnerabilities detected
Monitor: Continuous monitoring for security incidents, vulnerabilities, and compliance violations
Operate: Ongoing security monitoring, threat detection, and compliance checks in the production environment
Planning: Identifying security requirements alongside development and operational goals
Release: Ensuring security compliance and signing off on all checks before deployment
Testing: Automated security testing, including static and dynamic analysis, vulnerability scans, and penetration testing
Supported languages
English
Portuguese
Training and support
Free trial available:
No
Target ECSF profile
Cyber incident responder
Cybersecurity auditor
Cybersecurity educator
Cybersecurity implementer
Cybersecurity researcher
Cybersecurity risk manager
Digital forensics investigator
Support
Email/Help Desk
Available trainings
Yes
Recommended list of trainings