Analysed Security Areas

AMPEG Security Lighthouse offers more than 450 analysis. A Lighthouse user therefore does not need to assemble anything to get at security-relevant information. Just add an analysis to the dashboard and the analysis of the security status can begin. Customise results by adjusting limiting and threshold values, categories, filters, and selecting company locations. The effort for creating detailed analysis is reduced to a minimum.

Connection with collectors

The leading manufacturers of security systems are connected to the AMPEG Security Lighthouse by collector. We already import information for the overall monitoring and reporting as well as the correlation of data from the following areas:

  • Advanced Targeted Attack, APT
  • Advisories: VMware Security Advisory, ...
  • Anti-Spam
  • Malware Protection: Anti-Virus, -Spyware, ...
  • Asset and Device Discovery
  • Book of Standards
  • Certificates
  • Cloud Computing
  • CMDB: Configuration and Asset Management Database
  • Configuration Management System: Security Instructions
  • CVE Catalogue
  • Device Control
  • Directories: Active Directory
  • Encryption
  • Endpoint Detection and Response (EDR)
  • EoL Catalogue
  • Firewall Host-based
  • Industrial: AV, Patch Management and Inventory for systems from manufacturing
  • ISMS: Information Security Management System
  • Intrusion Detection and Prevention
  • Mobile Device Management
  • Network Device Management
  • Printer Device Management
  • SIEM: Security Information and Event Management
  • Soft- and Hardware Inventory and Software Asset Management
  • Update and Patch Management
  • Virtualisation: VMware
  • Vulnerability Management
  • Web-, URL-, Content-Filter

Quality Assurance

Continuous monitoring of the current security status of all systems is an important prerequisite for establishing high quality in IT security.

Survey Results

34 percent place their trust in systems that function automatically - They believe that "basically, network security is not in danger, even though no explicit control of whether an update took place successfully or not is performed."

Results of a survey by AMPEG of 200 chief security officers at major German companies.