This website uses cookies to ensure you get the best experience. More Information...


Datasheet: Vulnerability Management

On this ground, Obrela Security Industries has developed a unified, next-generation, innovative, centralized Vulnerability Management platform; SWORDFISH VMC. Vulnerability Management Console is a centralized security reporting web application environment, based on a customized information workflow, optimized for Penetration Testing and Vulnerability Assessment activity projects. On top of security reporting, VMC offers a versatile customizable workspace, providing monitoring capabilities based on user defined parameters, allowing the visual presentation of report statistics, criticality, resolution status etc. […]

Datasheet: Ciso Portal (The Hub)

One of the key functions of the Swordfish Platform is the rapid and centralized deployment of the ISF to the entire organization based on each employee, Business Role and Information Security Role. The Swordfish Platform achieves this via the CISO Portal module, which is the application homepage for all end-users. The CISO portal, as its name suggests, is designed to be the single reference point and information repository […]

Swordfish Technology Brochure

Operational security requires a continuous process of awarene ss, preparedness and readiness; The Information Security Program. A highly  demanding, cross – domain activity that requires effective communication and coordination between people that often have different knowledge and perspective for information security within the organization. Challenged by the complexity and cost of assem bling security  knowledge, […]

Exposure Management Brochure

As IT environments constantly grow due to demand and evolve due to new services such as the Internet of Things, Bring Your Own Device, Cloud  Services, Social Media and big data, IT Security becomes a necessity not only for mid to enterprise range but for even smaller companies as well.  On top of that and […]

Web Application Security Brochure

Web Applications are a direct target for attacks, as they are directly accessible from all parts of the world and form a surface to valuable information and, many times, Personally Identifiable information (PII) such as credit cards, identity numbers, health information, etc. Each year, web-borne attacks are increased by 30%, while successful breaches reach up […]

Threat Management Brochure

Organizations have already made significant investments in order to implement best‐of‐breed, multi‐layered information security architectures, adopting in a relatively small timeframe a multitude of technologies such as Firewalls, Intrusion Detection Systems, Web Application Firewalls, Anti-virus / Anti-spam / Anti-phishing systems, etc. in a never‐ending race of improving their security posture and being able to cope […]