We bring the right Solution to our clients and partners

_ About us Kataktissi

  • We are a cyber security services and Value Added Distributor. We offer the right solution for our clients and partners needs. Our services and products can be tailored together to create value. Focused in products that are easy to use and implement with a team of seasoned specialists.
  • Our mission is to help our partners (consulting cybersecurity companies) to build the right solution and create more business opportunities for them.

_Technologies

  • IAMIdentity Access Management
  • IGAIdentity Governance Administration
  • MFAMulti-Factor Access
  • CIAM – Customer IAM
  • Wi-Fi Captive PortalWi-Fi Access Management
  • Data Encryption Tokenization
  • Continuous Threat Exposure Management Pen testing automation
  • CAASMCyber Asset Attack Surface Management
  • XTIExtended Threat Intelligence
  • Data Protection – GDPR & LGPD
  • Certificate and Key Automation Management
  • Micro Segmentation

_ Solutions

  • Kartos XTI by Enthec – A non-intrusive platform that detects 9 threat categories
  • Net
  • DNS Health/Phishing
  • Patch Management
  • IP Reputation
  • Web Security
  • Document Leaks
  • Credential leak
  • Social networks
  • Email security
  • QONDAR – VIP and Executive Vulnerability scanning
AM – To manage access for collaborators and third parties
  • SSO
  • ADAPTIVE AUTHENTICATION
 IGA – To manage and govern the identity of employees and third parties
  •  LIFECYCLE MANAGEMENT
  •  ACCESS REQUEST
  •  ACCESS CERTIFICATION
  •  ACCESS POLICIES
MFA – To increase security in employee access
  • ONE TIME PASSWORD (OTP)
  •  BIOMETRY
  •  SECURITY KEY / TOKEN
WiFi – To manage access to the corporate Wi-Fi environment
  • CAPTIVE PORTAL
  • LOGIN COM DIFERENTES IDPs
  •  ANALYTICS
  •  MFA INTEGRATION

HardprotData Encryption, Data Access Control and Certificate & Key Management

Certigic simplifies the process of creating a digital certificate inventory and ensures that your servers are continuously running while maintaining data traffic protection.

With Certigic, you can efficiently manage and organize your digital certificates. It provides an easy-to-use interface that allows you to generate, store, and track your certificates in a centralized inventory. This streamlines the certificate management process, saving you time and effort.

Furthermore, Certigic ensures that your servers are up and running 24/7. It monitors the status of your servers and certificates, providing alerts and notifications in case of any issues or expirations. This proactive approach helps you maintain a secure and reliable infrastructure, minimizing disruptions to your data traffic.

By leveraging Certigic, you can have peace of mind knowing that your digital certificates are properly managed and your servers are protected, allowing for smooth and secure data communication.

Ridge Security AI – Exposure Management

RidgeBot®

Discover the AI-Agent exposure management solution that identifies cyber risks by prioritizing the exploitable vulnerabilities and validating security controls.

AI Agent Continuous Threat Exposure Management Solution

RidgeBot® enables CISOs to minimize cyber risks from increasingly sophisticated and frequent cyberattacks by validating cybersecurity controls and processes that protect the attack surfaces. RidgeBot delivers exposure management by automatically testing and validating an organization’s entire attack surface’s ability to withstand cyberattacks.

RidgeShield

Workload Security Policy Monitoring Platform

Zero-Trust Workload Policy Monitoring and Protection

RidgeShield provides a comprehensive security solution that protects workloads against modern security threats. With its label-based micro-segmentation, business-oriented flow view, and operating system baseline security check, organizations can ensure that their workloads are secure and compliant.

PurpleRidge

Self-Served Automated Website Security Testing

PurpleRidge enables organizations of any size to perform a security test on their website(s). PurpleRidge automates  penetration testing providing you with a comprehensive report when completed.

Organizations ranging from Ecommerce, legal and professional services, retail stores, VC firms, realtors, and more, rely on PurpleRidge™ Security to test their websites for vulnerabilities. If vulnerabilities are found, you’ll see them in the Free report. If vulnerabilities are found, you can provide the report to a qualified security professional or to an internal IT person to address the issues.

EcoTrust is a unified attack surface management (CAASM) platform that goes beyond traditional vulnerability management.

Eliminate the complexity of using multiple tools, spreadsheets, and manual reports by combining native scanners with security data from more than 50 sources, expanding visibility and providing reliable responses to cyberattack risks.

PROTEGON allows organizations of all sizes and segments to adapt to the GDPR in an automated way, optimizing, organizing, and simplifying the data protection and privacy governance process ensuring quality, availability legally and technically speakinh under the GDPR.

Micro-Segmentation technology – Reduce risk without the need for costly security hardware with a software-based microsegmentation approach.

Prevent lateral movement

Detect lateral movement and real-time threats across the entire cyberattack kill chain with a single platform.

Secure critical IT assets

Protect critical assets from ransomware by easily enforcing Zero Trust principles across hybrid cloud ecosystems.

_ Partners

_ Services Partners

  • 8×8 CyberTech
  • Tabnet Informática
  • DataSafe
  • RedStout
  • Risk Consulting
  • Stronit
  • TrueSec

_ Business Partners

  • OAgreement Technology
  • Viaflow
  • DSD Systems
  • GOA Technologies
  • Albatross Consulting

_ Contact

Contact us. Learn more about our products and services

All rights reserved

_Technologies

  • Kartos XTI by Enthec – A non-intrusive platform that detects 9 threat categories
  • Net
  • DNS Health/Phishing
  • Patch Management
  • IP Reputation
  • Web Security
  • Document Leaks
  • Credential leak
  • Social networks
  • Email security
AM – Para gerenciar o acesso de colaboradores e terceiros
  • SSO
  • ADAPTIVE AUTHENTICATION
 IGA – Para gerenciar e governar a identidade de colaboradores e terceiros
  •  LIFECYCLE MANAGEMENT
  •  ACCESS REQUEST
  •  ACCESS CERTIFICATION
  •  ACCESS POLICIES
MFA – Para aumentar a segurança no acesso de colaboradores
  • ONE TIME PASSWORD (OTP)
  •  BIOMETRY
  •  SECURITY KEY / TOKEN
WiFi – Para gerenciar acessos ao ambiente Wi-Fi corporativo
  • CAPTIVE PORTAL
  • LOGIN COM DIFERENTES IDPs
  •  ANALYTICS
  •  MFA INTEGRATION

RidgeBot®

Discover the AI-Agent exposure management solution that identifies cyber risks by prioritizing the exploitable vulnerabilities and validating security controls.

AI Agent Continuous Threat Exposure Management Solution

RidgeBot® enables CISOs to minimize cyber risks from increasingly sophisticated and frequent cyberattacks by validating cybersecurity controls and processes that protect the attack surfaces. RidgeBot delivers exposure management by automatically testing and validating an organization’s entire attack surface’s ability to withstand cyberattacks.

 

RidgeShield

Workload Security Policy Monitoring Platform

Zero-Trust Workload Policy Monitoring and Protection

RidgeShield provides a comprehensive security solution that protects workloads against modern security threats. With its label-based micro-segmentation, business-oriented flow view, and operating system baseline security check, organizations can ensure that their workloads are secure and compliant.

 

PurpleRidge

Self-Served Automated Website Security Testing

PurpleRidge enables organizations of any size to perform a security test on their website(s). PurpleRidge automates  penetration testing providing you with a comprehensive report when completed. 

Organizations ranging from Ecommerce, legal and professional services, retail stores, VC firms, realtors, and more, rely on PurpleRidge™ Security to test their websites for vulnerabilities. If vulnerabilities are found, you’ll see them in the Free report. If vulnerabilities are found, you can provide the report to a qualified security professional or to an internal IT person to address the issues.

Token+

Token+ (Tokenplus) is an innovative tool designed to encrypt unprotected data access, connections, and data itself while preserving the original format. The unique feature of Token+ enables encryption without requiring extensive reconfiguration of the database or other applications.

With Token+, you can seamlessly implement encryption measures to protect sensitive data without the need for major modifications to your existing systems. This means you can maintain the integrity and functionality of your databases and applications while ensuring that the data remains secure.

By preserving the original format, Token+ allows for smooth data operations and transactions to continue without disruption. This minimizes the impact on existing workflows and reduces the complexities typically associated with implementing encryption.

IAMPROT

Iamprot is a purpose-built solution designed to accelerate data access and reduce costs associated with data authentication issues.

With Iamprot, you can streamline the data access process, enabling faster retrieval and retrieval of information. By optimizing data access, you can improve the efficiency of your applications and systems, leading to enhanced performance and productivity.

Additionally, Iamprot helps address authentication issues, allowing for secure and seamless access to data. It offers robust authentication mechanisms that ensure only authorized users can access sensitive information, protecting against unauthorized access and potential security breaches.

By implementing Iamprot, you can not only enhance data access speed but also reduce costs associated with authentication challenges. This can lead to improved operational efficiency and cost savings for your organization.

Certigic

Certigic simplifies the process of creating a digital certificate inventory and ensures that your servers are continuously running while maintaining data traffic protection.

With Certigic, you can efficiently manage and organize your digital certificates. It provides an easy-to-use interface that allows you to generate, store, and track your certificates in a centralized inventory. This streamlines the certificate management process, saving you time and effort.

Furthermore, Certigic ensures that your servers are up and running 24/7. It monitors the status of your servers and certificates, providing alerts and notifications in case of any issues or expirations. This proactive approach helps you maintain a secure and reliable infrastructure, minimizing disruptions to your data traffic.

By leveraging Certigic, you can have peace of mind knowing that your digital certificates are properly managed and your servers are protected, allowing for smooth and secure data communication.

_ Solutions

  • Automatyzed XTI AI – Monitor and Analyze your web domain giving all the information you need to protect you against cyber criminals.
  • CISO as a Service – Manage your cyber security issues without the burden of maintaining your own team using our specialists expertise.
  • GDPR (LGPD) compliance analysis and recommendation.
  • IAM & Customer IAM – ZeroTrust, Identity Orchestration, Access Management, Risk Analysis
  • PAM – Access, Digital Vault, Digital Certificates management, Devops