Professional Documents
Culture Documents
Transformation whitepaper
Solutions (DTS)
Today, for businesses of any size or in any sector, a cyber-attack is more about predicting the
occurrence than weighing its possibilities. A cyber resiliency strategy and dedicated platform
are imperative to protect everything from sensitive data and personally identifiable
information (PII) to governmental and industry information systems in any organization.
All this boils down to a fundamental point: cybersecurity needs to be continuous in nature.
The same firewalls and techniques that protected you years ago might become ineffective
now. Upgrading the antivirus software on end devices and deploying single-factor
authentication no longer cuts the mark. New vulnerabilities have to be detected and fixed.
Cybersecurity needs to go beyond the baselines of organizations like The National Institute of
Standards and Technology (NIST), regulatory best practices, and internal compliance controls.
And above all, it must go beyond ‘application patching’.
© 2022 HARMAN International | services.harman.com
Enter: HARMAN DefenSight
Enabling advanced cyber-resilience
HARMAN DefenSight is a Cybersecurity Asset Management Platform that solves the
aforementioned challenges by keeping Information Technology (IT) and Operations
Technology (OT) systems safe and secure using real-time threat intelligence, monitoring,
analytics, and remediation. The patent-pending CybeIntel platform analyzes enterprise systems
at the hardware, operating system, and application levels to discover security vulnerabilities,
and conduct risk scoring, classification, and automated remediation of vulnerabilities.
This results in
By triangulating internal systems data with external threat data in innovative ways,
DefenSight improves enterprise security and customer experience across multiple
engagement channels, reducing the cost, complexity, and time to discover, analyze, and
remediate enterprise vulnerabilities.
DefenSight uses HARMAN-defined metadata to conduct these tasks and offer patching tools.
Being heterogeneous in nature, it supports Windows, Linux, Mac and offers customization of
best-suited security policies as per requirement.
Enterprise
IT Assets
Threat
Remediation
Policy Data
Social Media, External Security Others
Media Data sources Data sources
Internal security Logs
Twitter CVE(https://cve.mitre.org/) ArcSight/SIEM)
It gathers input from various internal and external sources to validate the security threats of
these systems, leverages AI/ML and graph analytics models to generate a risk score and
identify vulnerable assets, and predicts which other potential systems could be vulnerable. It
recommends the right software intervention to solve the vulnerability issue and applies the
software solution in an automated fashion. It enables enterprises to keep their IT systems safe
and secure with real-time threat intelligence analytics.
About HARMAN
HARMAN (harman.com) designs and engineers connected products and solutions for automakers, consumers, and enterprises
worldwide, including connected car systems, audio and visual products, enterprise automation solutions; and services supporting
the Internet of Things. With leading brands including AKG®, Harman Kardon®, Infinity®, JBL®, Lexicon®, Mark Levinson® and
Revel®, HARMAN is admired by audiophiles, musicians and the entertainment venues where they perform around the world.
More than 50 million automobiles on the road today are equipped with HARMAN audio and connected car systems. Our
software services power billions of mobile devices and systems that are connected, integrated and secure across all platforms,
from work and home to car and mobile. HARMAN has a workforce of approximately 30,000 people across the Americas, Europe,
and Asia. In March 2017, HARMAN became a wholly-owned subsidiary of Samsung Electronics Co., Ltd.