Cavisi Vault - Proof of Concept
To demonstrate the scope and coverage of the Clavisi Vault solution, we offer a free-of-charge 30 day Proof of Concept
We will install our agent onto your Domain Controller, servers and user devices, then collect data for 14 days. We then present you with the results. You then decide if you would like to adopt Clavisi Vault for your company
Network Inventory
What websites and servers we are connecting to? They may be malicious!
Software Inventory
Do you have unnecessary software, dangerous software, compliance issues? Do they show vulnerabilities?
Asset Inventory
Do you know what's inside your network, including potential malicious hardware? You can't protect what you don't know about
Operating System Events Collection
We correlate events between the various systems for the identification of an attack during its execution, or before an escalation occurs with serious impacts
The Clavisi solution includes a powerful ‘Vault’, which can be purchased stand-alone to cover legal requirements, and to collect valuable information. In case of an attack, thanks to Clavisi Vault you can understand what happened, and where, which is critical for your protection (e.g. We can catch the threat actor while it is going around the network, before it deploys ransomware).
In the PoC, we collect data for 14-days in our cloud-based Clavisi Vault. After the data has been collected, we collate it and identify potential vulnerabilities, breaches, attacks, as well as giving you a network and asset inventory.
At the end of the PoC we will present our findings (including: Network Inventory, Software Inventory, Asset Inventory, Operating System Events Collection) to you across a detailed set of reports. You will receive the reports as part of the PoC.
PoC – Scope
The scope of our PoC will consist of:
Day 1-7: Installing our Clavisi Vault application and Clavisi Beacons on:
Domain Controller (x1)
Servers (usually 5-10)
User Devices (usually 10-40)
Day 8-21: We collect data from the Domain Controller, servers and user devices via the Clavisi Beacons into the Clavisi Vault.
Day 22-29: We will collate the data and create reports detailing potential vulnerabilities, breaches and attacks.
Day 30: We will present the reports to you during a 2-3 hour online meeting. You will be emailed electronic copies.
Book your Clavisi Vault Proof of Concept
If you would like to book our proof of concept, please complete the form below and we'll contact you to discuss the details