Enterprise Services
CRAG is an integration partner for SentinelOne, Qualys, Avanan, and Hook Security. If you are looking to deploy these tools, we assist with licensing, implementation, and training your IT staff.
SentinelOne:
Gartner® Magic Quadrant™ Security
Why we chose SentinelOne
We started using S1 in 2020, and we've been impressed ever since
-
Consistently wins top awards for quality
-
Rapidly adopts new capabilities; rapidly growing AI models
-
Modular and growing Singularity Platform deployed through a single light-ish agent
-
S1 hires employees who are careful with the "Deploy Update" button
Data and AI
PurpleAI
A conversational user interface for your SecOps team
​
AI-SIEM
Hyperautomate your SOC with an AI model trained on your security data
​
Singularity Data Lake
Consolidate your security data into a single, long-term storage lake
​
Singularity Data Lake for Log Analytics
Aggregate, store, and analyze log data from across your environment
Endpoint Security
Singularity Endpoint
​Real-time detection and response of known and behavioral threats
​
Singularity XDR
Correlate data across endpoints, cloud, identity for unified threat detection
​
Singularity RemoteOps Forensics
Automate digital forensic evidence collection for incident response
​
Singularity Threat Intelligence
Global network of threat data for real-time, actionable insights​
​
Singularity Vulnerability Management
Discover, prioritize, and mitigate the most critical risks
Cloud Security
Security for servers, VMs, containers, and serverless functions
​
Singularity Cloud Native Security
Security for containers, Kubernetes, and microservices
​
Singularity Cloud Workload Security
Secure workloads running in public, private, or hybrid cloud environments
​
Singularity Cloud Data Security
Protect data in cloud object storage solutions
Qualys: compliance and vulnerability management
Why we chose Qualys
Its ability to automate security processes, simplify compliance, and assign a dollar value to risk
-
Single platform for vulnerability management and compliance
-
Automated vulnerability, patch, and compliance management
-
Subscription model offers predictable budgeting
Risk Remediation
TruRisk Eliminate (TE)
Vulnerability remediation strategies when patching isn't viable
Patch Management (PM)
Automate and accelerate patch management
TruRisk Mitigate (TM)
Mitigate risks when traditional patching isn't immediately feasible
Custom Assessment and Remediation (CAR)
​Build or borrow custom scripts for assessment and remediation
Compliance
Policy Compliance
Assess, automate, and manage compliance
File Integrity Monitoring (FIM)
​Track changes to critical system files, configurations, and content
Asset Management
CyberSecurity Asset Management (CSAM)
​Enhance visibility, control, and security of IT assets
​
External Attack Surface Management (EASM)
Visibility and security for assets that are exposed to the internet​
Vulnerability Management
Enterprise TruRisk Management (ETM)
Unified view of cybersecurity risk across the entire enterprise
TotalAI
Secure your generative AI (GenAI) and large language models (LLMs)
Vulnerability Management, Detection & Response (VMDR)
Unified vulnerability management, threat detection, and response
Web App Scanning (WAS)
Discover, assess, and secure web applications and APIs
API Security
​Identify vulnerabilities, misconfigurations, and potential threats in both REST and GraphQL APIs
Avanan: Email, Collaboration, and Accounts
Why we chose Avanan
Better filtering, more features, and less tech time than competing products
-
22% fewer false positives/negatives than our previous solution, based on internal data
-
Account takeover protection included in the mid-tier product at a great price point
-
31% reduction in tech time spent reviewing flagged emails, based on internal data
Account Protection
Account Takeover Protection
Detecting risks from compromised accounts using behavioral analysis
User Behavior Analytics
Monitoring user activities to identify anomalies (e.g. impossible travel)
Unified Quarantine
Administer quarantined emails across platforms
Incident Response-as-a-Service (IRaaS)
Reducing burden on internal IT teams
System Management
ThreatCloud AI
Global threat intelligence for enhanced security effectiveness
Service Status Reporting
Real-time updates on system health and performance
Multi-Tenancy
Manage multiple departments under a single interface for large orgs
Email Defense
Phishing Protection
Advanced AI detection of phishing attempts
Malware Protection
Pre-delivery scanning and detonation of attachments and links
Ransomware Defense
Pre-delivery link & sender anomaly analysis for unknown threats
Spam Filtering
Intelligent spam blocking through machine learning
One-Click Deployment
Uses Azure integration without the need for MX redirect
Pre and Post-Delivery Protection
Pre-delivery filtering with available post-delivery removal
AI & Machine Learning
Continuously adaptive threat prevention
Collaboration and Data Security
Teams & Slack Security
Real-time protection against threats in common messaging apps​
​
Cloud Storage Security
Monitoring files stored or shared through OneDrive, SharePoint, Box, ++​
​
Data Loss Prevention (DLP)
Preventing unauthorized sharing of information across cloud platforms
​
Compliance
Supporting compliance with data policies and controls
Hook Security: Security Awareness Training (SAT)
Why we chose Hook Security
SAT is usually boooring, and Hook makes it fun and engaging
-
Short, fun videos that get to the point
-
Easy deployment through Azure integration
-
Phishing simulation and remedial training
-
SCORM compliant integration for HR's LMS
Reporting
-
In-depth reports to identify at-risk employees
-
Compliance tracking and demonstration capabilities
-
Real-time insights and actionable data
Integrations
-
Integration with various Learning Management Systems (LMS) through SCORM compliance
-
Email client plugins (like Hookmail for Microsoft and Google) for in-inbox training and reporting
-
User management features allowing for easy enrollment and tracking of training progress
Security Awareness Training
-
Annual training modules for employee education
-
Monthly deep dives into security topics
-
Variety of training content tailored to different learning styles and needs
Phishing Simulation
-
Automated phishing simulations
-
Instant training feedback for those who click on phishing emails
-
Micro-learning modules to educate users on the spot