>

Contain-X Connector

Speed up cyber incident response by automating the containment actions, such as blocking malicious IPs or isolating an endpoint.

CONTACT US
feature icon
Rapid Response to Contain Threats and Limit Damage.
feature icon
Orchestrate Containment Across Multiple IT Systems, On-prem or Cloud.
feature icon
Track Containment Actions with Other Incident Response Actions.
feature icon
Change Credentials to Take Containment Actions Any Time on Your Own.

You need to be fully prepared to trigger containment actions if breached.

Rather than sit and wait for the damage to be done, Contain-X Connector is an extension of our Security Orchestration, Automation & Response (SOAR), that automates threat containment actions to restrict threats, speed up and support incident response, in rapid time.

Contain-X Connector supports the most highly used security technologies for containment actions such as:

Firewalls
EDR
Active Directory
Email Security Gateways
WAF
Learn More

Contain-X Connector Works as an Add-on Module to Managed Detection and Response (MDR)

Book a free consultation with one of our experts today

CONTACT US

Contain-X Connector Service Features

Hardened System

Hardened System

  • Contain-X Connector is installed on hardened OS, and monitored 24x7 for suspicious activities by SOC. It accepts connections only from Contain-X Master
Data Transmission

Data Transmission

  • Transmission of credentials and commands happens over an encrypted channel using latest TLS v1.3 protocol.
Small Footprint

Small Footprint

  • Contain-X Connector can be installed on small virtual machines with minimum resources and restricted network access.
Deployed in the Customer Network

Deployed in the Customer Network

  • Contain-X Connector is deployed in the customer network, to prevent unnecessary exposure to the internal network from the MSSP network.
Credential Storage

Credential Storage

  • Credentials required for taking actions are stored in encrypted form on Contain-X Connector, using AES-256-GCM on the client side.
Uptime and Security

Uptime and Security

  • SOC monitors uptime and security of Contain-X Connector on 24x7 basis and is responsible for monitoring and management.

Get the Contain-X Connector Datasheet

To learn about the benefits at a more granular level, and to review our service features in detail, download data sheet here.

DOWNLOAD
SHQ Contain X Connector service datasheet
mesh

Get in Touch!
Experience the benefits of Contain-X Connector.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.