Vigilar, an Atlanta, Ga.-based information security solutions and services provider, today announced the release of version 2.0 of ATLAS, its holistic Security-as-a-Service solution.
The latest version includes new functionality in risk management, network monitoring and asset tracking, as well as enhanced compliance audit support and full device management capabilities.
Execs say that the latest version of ATLAS addresses the growing need for asset management and security, which has become a highly complex and costly IT function that has demanded increased expertise and meticulous oversight for most businesses. As a result, many businesses find themselves heavily taxed for staffing and resources in order to secure their IT assets and manage their security infrastructure.
Ryan English, vice president of products and services for Vigilar, said that the comprehensive solution eliminates the expense and hassle of purchasing hardware and software and employing IT personnel to manage it in-house.
"The average tenure is 10 months for a security professional. People are spread so thin, they have to firefight," said English. "That's what ATLAS is designed to address."
"What we're doing with ATLAS is nothing sexy," he continued. "We're doing something that no one else wants to do," he said.
Altogether, the new ATLAS 2.0 includes infrastructure asset identification, new change monitoring and management, and network vulnerability detection, which includes passive and active scanning, risk analysis and intrusion detection capabilities. In addition, the new version also includes improved asset and license management, managed Web content filtering, and full management for security devices such as firewalls, IDS and IPS devices.
ATLAS is delivered via five managed service modules—asset identification, technical support, log management, authentication management, and systems maintenance, monitoring and management -- which can be purchased altogether or as individual solutions.
One of the most significant features is the asset identification module, a scanning devise which automatically discovers vulnerabilities or abnormalities on business networks with both passive and active monitoring, execs say. New technology allows users to apply a vulnerability rating and determine impact level and exposure once an error is detected.
Another key point is the technical support, English said, which addresses the widespread dissatisfaction partners have with technical support from their vendors.
"Vendors don't get in the business of developing software to provide technical support. They're more than happy to offload that," he said.
The technical support function provides a 24/7 operation center, with experts available to manage the appliance and alert customers of significant vulnerabilities detected in their networks.
"The tagline is 'one throat to choke.' It gives you that single point of contact," said English
In addition, the solution provides a comprehensive log management system, with customized reporting capabilities, to help businesses adhere to increasingly stringent Payment Card Industry and other regulatory compliance standards. "It's all stuff that companies have to do. They don't want to pay someone to do it," said English. "That's what we're doing. We're reducing the burden of managing your IT infrastructure."
related stories
Video
trending stories
sponsored resources

CRN Showcase

APC by Schneider Electric
Digital Services for Edge Learning Center

Channel Chief Showcase

Comm100
Collaboration & Communications 360

Cradlepoint
5g for Business 360

Cato Networks
SASE & SD-WAN 360

Trend Micro
Trend Micro Learning Center

Veeam
Veeam

Acer
Remote Workforce 360

Partner Program Guide Showcase

NPD
Industry Trends 360

Comcast Business
Comcast Business Learning Center

Terranova Security
Cybersecurity 360

CyberPower
CyberPower

eSentire
Managed Detection and Response 360

EPOS
EPOS

Sherweb
Sherweb

Dell Technologies
Dell Technologies Cloud Learning Center

Dell Technologies
Microsoft HCI Solutions from Dell Technologies Learning Center

Dell Technologies
Dell Technologies Server Learning Center

Carbonite
Cloud Storage 360

VMware

HubStor
Cloud Backup 360

Wasabi
Wasabi

Cysurance
Cyber Insurance 360

Vertiv
Edge Computing Learning Center

Webroot
Webroot Learning Center

Tenable
Cyber Risk 360

Fujifilm
Fujifilm

Sophos
Sophos Cybersecurity Learning Center

Vonage
Vonage

BlackBerry
BlackBerry Learning Center

Cyber Protection 360

Application Integration 360

Hitachi Vantara
Hitachi Vantara

Smart 3rd Party
3rd Party Maintenance 360

SentinelONE
EndPoint Security 360

iboss
Cloud SASE Platform 360

Dell Technologies
Dell Technologies Storage Learning Center

Fortinet
Fortinet

Area 1 Security
Area 1 Security
