C3M   API Connector

Qualys API Connector

C3M is an API based cloud security posture management and compliance assurance platform that offers enterprises complete cloud control through actionable cloud security intelligence across cloud infrastructure..

Duo API Connector

Example widgets from the C3M Vulnerability Management data-suite...

Qualys API Connector
0

Total Devices

C3M is an AI-based endpoint security solution that prevents breaches and provides added controls for safeguarding against sophisticated threats. Human intervention, cloud connections, signatures, heuristics, and sandboxes are not required.

Monitor total devices in your Infrastructure using Stratiam and cross-correlate these against other security protection signals, for example Active Directory and Breach Aware.

0
%

Online Devices

Unified Endpoint Security (UES) needs to protect people, devices, networks and apps by offering improved cross-platform visibility and cyber threat prevention and remediation, while simplifying administration.

Cylance leverages artificial intelligence, machine learning and automation to provide improved cyber threat prevention and remediation, while offering visibility to help you manage all endpoints with the highest level of security. Track all end-points including desktop, mobile, server and IoT. Monitor the percentage of your entire estate online at any one time and send this signal to your Strataim instance.

Unprotected Devices
0

Unprotected Devices

Monitoring the number of Unprotected Devices is crucial to your endpoint protection strategy. Surface signals on exposed, un-protected, devices with 'no device control' to your Stratiam instance, so you can rapidly take action and optimise your IT security infrastructure.

Unprotected Devices
0

Unsafe Devices

Use Unsafe Devices to quickly display the number of devices with a policy that has both Unsafe and Abnormal properties.

0

Malware Threats.

Recently, Cylance® observed a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Overall Malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and various IoT platforms.

Carefully monitor these, and others, within Stratiam to add value to your overall IT Security strategy.


Example chart types from the C3M data-suite...

Chart types are an enhancement beyond what would be available in the native C3M platform and are an example Stratiam value-added features. Actual platform visualisations may differ to what is demonstrated in the concepts below. All charts have linked drill-paths for further data-exploration.

Cross Correlate

Monitor devices in Cylance and other platforms. Use the combined signals from both to cross-correlate and surface completely unique views.



Threat Explorer

Explore threats in Cylance and other platforms. Use the combined signals from both to cross-correlate and surface completely unique views.




Connecting to C3M via our API connector is easy, you simply need to request a trial, after which we'll help set you up with your API credentials, select visualisation types and relevant permissions to get started. If you have other data-services you are interested in connecting to, we'd recommend checking out our other data-connectors.