Skip to main content

Recently Updated Pages

GCP and CSPM-GCP Integration

System Integrations

This Google Cloud integration collects and analyzes a wide range of logs and metrics to provide c...

Updated 1 week ago by Richmond Abella

GCP - Setup a Log Sink

System Integrations

Setup Log Sink Using Google Cloud Console Navigate to "Logging" > "Log Router" > "Create Sin...

Updated 1 week ago by Richmond Abella

GCP - How to Add a Role

System Integrations

Go to the Google Cloud Console. Navigate to IAM. Click on "IAM & Admin" in the left...

Updated 1 week ago by Richmond Abella

GCP - How to enable Cloud Asset API

System Integrations

Please refer to these instructions to enable Cloud Asset API. To enable the Cloud Asset API fo...

Updated 1 week ago by Richmond Abella

CyTech Aquila - Cloud Security Posture Management (CSPM) Module

Log Collector Installations

Cloud Security Posture Management (CSPM) Overview: CSPM helps secure your cloud infrastructure ...

Updated 1 week ago by Richmond Abella

Add Windows Integrations

System Integrations

Introduction  The Windows integration allows you to monitor the Windows OS, services, applicatio...

Updated 1 week ago by John Polestico

Virtual Penetration Testing

Attack Surface Management

Overview Welcome to the Virtual Penetration Testing module. In this section, you'll be guided th...

Updated 1 week ago by John Polestico

Open Cases

Dashboard Overview

In this section, you'll find a comprehensive overview of open cases within your organization. Her...

Updated 1 week ago by John Polestico

Risk Score

Dashboard Overview

The risk score serves as a comprehensive indicator of your company's overall risk level. This sco...

Updated 1 week ago by John Polestico

Cyber Security Risk Management

Cyber Risk Management

Overview: Cyber Security Risk Management is a systematic approach to identifying, assessing, and...

Updated 1 week ago by John Polestico

Security Assessment Questionnaires

Cyber Governance

Overview A Security Assessment Questionnaire (SAQ) is a tool used by organizations to evaluate t...

Updated 1 week ago by John Polestico

Security Compliance

Cyber Governance

Overview The Security Compliance Module is an essential component of our Software-as-a-Service (...

Updated 1 week ago by John Polestico

Privacy Compliance

Cyber Governance

Overview The Privacy Compliance module, a component of the Software-as-a-Service (SaaS) vCISO Wo...

Updated 1 week ago by John Polestico

Vulnerability Assessment and Management

Attack Surface Management

Overview Welcome to the Vulnerability Assessment and Management module. In this section, you'll ...

Updated 1 week ago by John Polestico

Threat Intelligence

Attack Surface Management

Overview This advanced module operates as a virtual threat analyst, continuously gathering, anal...

Updated 1 week ago by John Polestico

Cyber Incident Management Module

Cyber Detection and Response

Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...

Updated 1 week ago by John Polestico

Endpoint Detection and Responce (EDR) - Manual Installation

Log Collector Installations

Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR), is a cybersecurity ...

Updated 1 week ago by Richmond Abella

Log Collector Installation - Windows Manual

Log Collector Installations

Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...

Updated 1 week ago by Richmond Abella

How to uninstall Elastic Agent - Windows

Log Collector Installations

Uninstall Elastic Agent There are two primary methods to uninstall the Elastic Agent on Windows:...

Updated 1 week ago by Richmond Abella

Log Collector Installation - Windows Automatic

Log Collector Installations

Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...

Updated 1 week ago by Richmond Abella