SteelCloud LLC

steelcloud.com

SteelCloud LLC
SteelCloud develops STIG & CIS policy remediation solutions for DoD/government & commercial customers. ConfigOS is a patented STIG/CIS policy remediation tool for managing secure baselines and implementing/maintaining STIG/CIS-compliant environments. Unlike simple scanning and reporting tools, ConfigOS actually fixes/remediates STIG/CIS controls. ConfigOS allows customers to harden controls around an application environment in less than 60 minutes - versus days/weeks/months. ConfigOS can scan 3,000 to 5,000 Windows or Linux endpoints per hour and can remediation 1,000 to -3,000 endpoints per hour – per instance of ConfigOS. Comprehensive compliance reporting and XCCDF output are automatically produced.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

THE CYBERSECURITY IMPLICATIONS OF WORKING REMOTELY

Help net security | March 20, 2020

news image

The global spread of the COVID-19 coronavirus has had a notable impact on workplaces worldwide, and many organizations are encouraging employees to work from home. What are the cybersecurity implications of this shift? Having a sizable amount of employees suddenly working remotely can be a major change for organizations and presents numerous problems with regard to cybersecurity. One issue involves a lack of authentication and authorization. Because people are not seeing ea...

Read More

Data Security

LIVING SECURITY HOSTS A PANEL OF INDUSTRY EXPERTS TO DISCUSS EMERGING THREATS

Living Security | May 27, 2021

news image

Living Security, a pioneer in Human Risk Management and a cybersecurity awareness training leader, is proud to host this year's Breaking Security Awareness Conference 2021, which will be held virtually on Thursday, June 24, 2021. The free event will educate business, IT, and security leaders on the most recent threats emerging in our increasingly digital world, as well as explain how effective training can protect employees both at work and at home. Read More

DATA BREACH: WHY IT’S TIME TO ADOPT A RISK-BASED APPROACH TO CYBERSECURITY

Help Net security | January 28, 2020

news image

The recent high-profile ransomware attack on foreign currency exchange specialist Travelex highlights the devastating results of a targeted cyber-attack. In the weeks following the initial attack, Travelex struggled to bring its customer-facing systems back online. Worse still, despite Travelex’s assurances that no customer data had been compromised, hackers were demanding $6 million for 5GB of sensitive customer information they claim to have downloaded. Providing services to some of the ...

Read More

Enterprise Identity, Software Security, Cloud Security

LOOKOUT ANNOUNCES THE SUCCESSFUL DIVESTITURE OF ITS CONSUMER MOBILE SECURITY BUSINESS SEGMENT

Businesswire | June 05, 2023

news image

Lookout, Inc., the endpoint-to-cloud security company, today announced it has closed the previously announced sale of its consumer mobile security business to F-Secure, a global provider of consumer security products and services. With this strategic divestiture Lookout will focus on expanding its core enterprise business, built around the Lookout Cloud Security Platform. The sale of Lookout’s consumer mobile security business represents a deliberate and strategic decision...

Read More
news image

THE CYBERSECURITY IMPLICATIONS OF WORKING REMOTELY

Help net security | March 20, 2020

The global spread of the COVID-19 coronavirus has had a notable impact on workplaces worldwide, and many organizations are encouraging employees to work from home. What are the cybersecurity implications of this shift? Having a sizable amount of employees suddenly working remotely can be a major change for organizations and presents numerous problems with regard to cybersecurity. One issue involves a lack of authentication and authorization. Because people are not seeing ea...

Read More
news image

Data Security

LIVING SECURITY HOSTS A PANEL OF INDUSTRY EXPERTS TO DISCUSS EMERGING THREATS

Living Security | May 27, 2021

Living Security, a pioneer in Human Risk Management and a cybersecurity awareness training leader, is proud to host this year's Breaking Security Awareness Conference 2021, which will be held virtually on Thursday, June 24, 2021. The free event will educate business, IT, and security leaders on the most recent threats emerging in our increasingly digital world, as well as explain how effective training can protect employees both at work and at home. Read More

news image

DATA BREACH: WHY IT’S TIME TO ADOPT A RISK-BASED APPROACH TO CYBERSECURITY

Help Net security | January 28, 2020

The recent high-profile ransomware attack on foreign currency exchange specialist Travelex highlights the devastating results of a targeted cyber-attack. In the weeks following the initial attack, Travelex struggled to bring its customer-facing systems back online. Worse still, despite Travelex’s assurances that no customer data had been compromised, hackers were demanding $6 million for 5GB of sensitive customer information they claim to have downloaded. Providing services to some of the ...

Read More
news image

Enterprise Identity, Software Security, Cloud Security

LOOKOUT ANNOUNCES THE SUCCESSFUL DIVESTITURE OF ITS CONSUMER MOBILE SECURITY BUSINESS SEGMENT

Businesswire | June 05, 2023

Lookout, Inc., the endpoint-to-cloud security company, today announced it has closed the previously announced sale of its consumer mobile security business to F-Secure, a global provider of consumer security products and services. With this strategic divestiture Lookout will focus on expanding its core enterprise business, built around the Lookout Cloud Security Platform. The sale of Lookout’s consumer mobile security business represents a deliberate and strategic decision...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us