TYCHON 1.7.6.7 – Digital Signatures, TYCHON Utilities, and more

This month Tychon will deliver the latest set of enhancements for its Endpoint Analytics and Remediation Platform – TYCHON Version 1.7.6.7. This release features security enhancements such as Digital Signatures, powerful new TYCHON tools, performance improvements, and more. Digital Signatures is a new optional feature which allows customers to sign content with a certificate prior…

TYCHON 1.7.6.6 Release – May 2021

This month TYCHON will release the latest update to its powerful Enterprise Endpoint Management Platform – TYCHON Version 1.7.6.6. With this new release comes a wealth of new features, including usability enhancements such as: follow up questions, file transfers, and more detailed question tracking, as well as expanded performance enhancements. Follow up questions will enable…

TYCHON Netflow: Query network data from any managed endpoint

The TYCHON Netflow module collects IP network traffic information as it enters or exits an interface and now provides ePO administrators the ability to query Netflow data from any managed endpoint. As part of the Automated Continuous Endpoint Monitoring (ACEM) plugin, network administrators now have endpoint visibility on packet source and destination of network traffic….

TYCHON Trace: Effectively Monitor Endpoint Activity

The TYCHON Trace module is now compatible with ePO 5.9 and 5.10 as part of the Automated Continuous Endpoint Monitoring (ACEM) plugin. TYCHON Trace is an advanced feature our customers use to investigate past and real-time activity for forensics, security operations, compliance and troubleshooting endpoints. It provides the ability to visualize and gather information about…

TYCHON Cyber Scorecard Dashboard: Turning questions into answers and answers into action

When it comes to addressing security and compliance across the enterprise, a real time solution is critical to building a network operation that is resilient, proactive, and effective. The speed at which assets on the network change, coupled with emerging and persist threats, warrants a flexible and adaptive approach. To keep pace with an evolving…

Stop using Script Wrapping Tools for Enterprise Administrative Tasks

What is a script wrapping tool? Simple scripting language which can be compiled into an PE type executable. How do they work? Administrators can write simple scripts in the known language of the wrapper which perform various administrative tasks.  Then, a compiler wraps a standard code base around that script and generates a single Executable…

TYCHON: Keeping up with Compliance

It seems like every couple years the government releases another federal compliance regulation and everyone has to scramble to figure out how to capture the data, report the data, and if you’re real good, do something about the data that you collected. For example, the government recently mandated compliance with Defense Federal Acquisition Regulation Supplement…

Applying Good Cyber Hygiene while Reducing the Attack Surface

A good portion of the software and hardware running on or within today’s computer networks is driven by convenience, flexibility and compatibility. The reality is that these features tend to take precedence over everything else, which might seem like a boon for users. But unless an organization can monitor and control all of the apps…

SOC’s Need a Single Interface to Bridge IT and Operations

Humans are incredible creatures who can process and create information faster and more efficiently than any other creature because both halves of our brains work together. The left side of the human brain is responsible for tasks that involve logic, science and mathematics while the right side handles creativity and the arts. Only having access…

Three Tips to Integrating IT Security and Systems Management

This week, we look at three of the most important things to consider when unifying these two teams: IT Security and Systems Management. Depending on the organization, Systems Management and IT Security may have very little to do with one another. However, there are advantages to having them cooperate and share information. While having a…

If you have an idea about a blog topic that you would like to read, please contact media@tychon.io!