Celerium’s Cyber Defense Network™ provides active defense against cyber threats. Reliability and security of the solution is crucial to our mission to help our customers fortify their cyber defense. Using AWS Cloud, CDN can quickly establish a cost effective and comprehensive computing platform that is reliable, secure, scalable, and easy to use with a global presence. In addition, AWS provides a robust set of built-in controls supporting most if not all compliance/regulatory programs for privacy and security that CDN has acquired for its cloud infrastructure.
The solution uses Kubernetes, Elastic Search, Elastic Cache, Amazon S3, Amazon SES, Amazon Kafka, EC2, Amazon Route 53.
Intelligent Decision Engine
The patented Decision Engine compares data from a firewall to more than 100 sources of cyber threat intelligence to identify potential cyber threats. A score is assigned based on predictive analytics, community analytics, and signals-based intelligence. From there, an optimized block list is created for the specific firewall – reducing the time, effort, and resources required to implement active cyber defense. The Decision Engine is hosted on the AWS cloud which helps ensure its reliability.
CDN Network Defender is pre-integrated with advanced reporting capabilities, leveraging AWS services. The reports provide details on identified threats, their severity based on the Decision Engine analysis, and their blocking status. These reports showcase the value in having the network threat detection and defense software in place, and they enable IT systems administrators and executive management to communicate about cyber defense.
“We’re proud to be an Amazon Web Services Public Sector Partner, especially because of what that means for our customers. Reliability and security of the solution is crucial to our mission to help our customers fortify their cyber defense. By teaming with the AWS cloud platform, CDN can quickly establish a cost effective and comprehensive computing platform that is reliable, secure, scalable, and easy to use with a global presence. In addition, AWS provides a robust set of built-in controls supporting compliance and regulatory programs for privacy and security that CDN has acquired for its cloud infrastructure.”
-Tommy McDowell, general manager at Celerium
Cyberattacks are growing, while the cyber skills gap and lack of resources persist for many organizations.
Tap into our experts via our email hotline. Ask your general CMMC and NIST-related questions.
Also take advantage of our on-demand video library and blogs for more information.
NIST 800-171 and CMMC can have many gray areas and be difficult to understand.
Our assessment tools help you determine gaps in your readiness so you can focus on the right areas.
Our easy-to-use online reference guide covers all CMMC 2.0 Level 1 – 3 practices and makes it easy to navigate what’s most relevant to you.
You are busy. So, each month, we read the news stories about CMMC.
We publish those articles relevant to your needs in our monthly academy newsletter.
It also features helpful tips and insights.
To stay current with the latest news on CMMC and related topics, read our free, monthly newsletter.
To learn from industry professionals on the latest in cybersecurity, ransomware and supply chain safety, watch our free webinars.
To navigate the CMMC domains and practices, access our free, online reference guide.