Recently Updated Pages
GCP and CSPM-GCP Integration
This Google Cloud integration collects and analyzes a wide range of logs and metrics to provide c...
GCP - Setup a Log Sink
Setup Log Sink Using Google Cloud Console Navigate to "Logging" > "Log Router" > "Create Sin...
GCP - How to Add a Role
Go to the Google Cloud Console. Navigate to IAM. Click on "IAM & Admin" in the left...
GCP - How to enable Cloud Asset API
Please refer to these instructions to enable Cloud Asset API. To enable the Cloud Asset API fo...
CyTech Aquila - Cloud Security Posture Management (CSPM) Module
Cloud Security Posture Management (CSPM) Overview: CSPM helps secure your cloud infrastructure ...
Add Windows Integrations
Introduction The Windows integration allows you to monitor the Windows OS, services, applicatio...
Virtual Penetration Testing
Overview Welcome to the Virtual Penetration Testing module. In this section, you'll be guided th...
Open Cases
In this section, you'll find a comprehensive overview of open cases within your organization. Her...
Risk Score
The risk score serves as a comprehensive indicator of your company's overall risk level. This sco...
Cyber Security Risk Management
Overview: Cyber Security Risk Management is a systematic approach to identifying, assessing, and...
Security Assessment Questionnaires
Overview A Security Assessment Questionnaire (SAQ) is a tool used by organizations to evaluate t...
Security Compliance
Overview The Security Compliance Module is an essential component of our Software-as-a-Service (...
Privacy Compliance
Overview The Privacy Compliance module, a component of the Software-as-a-Service (SaaS) vCISO Wo...
Vulnerability Assessment and Management
Overview Welcome to the Vulnerability Assessment and Management module. In this section, you'll ...
Threat Intelligence
Overview This advanced module operates as a virtual threat analyst, continuously gathering, anal...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Endpoint Detection and Responce (EDR) - Manual Installation
Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR), is a cybersecurity ...
Log Collector Installation - Windows Manual
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...
How to uninstall Elastic Agent - Windows
Uninstall Elastic Agent There are two primary methods to uninstall the Elastic Agent on Windows:...
Log Collector Installation - Windows Automatic
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...