HPT – HCAPOLLO software: centrally manages, monitosr security information

From commercial stage, HCapollo has been deployed as a single SIEM solution as well as a service provider platform for more than 30 customers of varied industries.

The rapid increase in applying information technology to business leads to advanced requirements in the protection of information security against sophisticated and increasing threats, but this fight does not come to a closing yet. Complexity within legacy systems is also a challenge in cyber security attempt of enterprises in every aspect and overview point of view. In latest  report of Hiscox insurance firm, it is approximately 200,000 USD cost for each cyber attack damage. And in a IBM statistic, an organization needs around 287 days for detecting and handling a security incident. The key helping enterprise to mitigate damage and business disruption is quick detection and response to a threat.

Equipping a security information and event management (SIEM) solution is an approach for improving detecting and responding ability cyber security threats. SIEM HCapollo which is developed by HPT in technology expertise orientation, granted Sao Khue (5 star) 2022 award, proves effectiveness in cyber threat detecting and responding for many systems, organizations. From commercial stage, HCapollo has been deployed as a single SIEM solution as well as a service provider platform for more than 30 customers of varied industries.

HCapollo collects, stores and processes centrally cyber security incident, helps to monitor, manage and process abnormal alerts, breaches within system, cover weakness of security alert fragmentation among legacy systems in organizations. HCapollo solution is the bridge between traditional security solutions, the link between advanced defense solutions where data is centrally managed, integrates advanced features and provides the ability for 24x7 operation to continuously maintain and monitor information security. Then the organization gain the comprehensive security monitoring picture. Thanks to centralized data source, HCapollo facilitates quick detection, handling of incidents, threats, breaches; meets all information security requirement of most enterprise: Flexible deployment model, appropriate to even Arigap environment; Overcome the incoherence between security systems; Support organization in management, overall and continuous monitoring 24x7; Serving digital transformation, effectively monitoring applications, integrating easily; Quickly detect and alert of security incidents, complicated and targeted attacks on the system; Support automating some monitoring and cyber incident responding process; Provide the ability for digital forensic when there is an information security incident or a request to do so; Support integration for unlimited input, unlimited EPS (if resource requirements are met); Meet compliance, log policy requirements, and monitor the organization's security practices; Ensure compatibility, allowing flexible customization according to the characteristics of the organization and best practice; Ensure visibility of almost log, event (structured and unstructured, contextual and non contextual) of even IOT, SCADA.

HCapollo has outstanding advantage in solving challenge of resource shortage and ensuring better information security monitoring and responding. HCapollo allows automation workflow which is the key to maximize the processing capacity of the monitoring system and save human resources. In addition, nowadays, many security personnel use self-written codes for workflow automation which can lead to serious problems because there is no uniformity and it is impossible to maintain and track, so HCapollo will provide customizable templates for building automation workflow to ensure efficiency and maintainability.

Through HCapollo, HPT does not only play the role solution provider, but also the role trusted partner, consultant, goes along with IT development, business strategy of enterprises. In order to help enterprise to get highest effectiveness of information security, to focus on core business.