Solutions & Services

Identity and Access Management

Today's organizations need to govern and enforce user access across multiple channels, including mobile, social and cloud. At the same time, they must address business needs such as role management, compliance and audit reporting and integration of various user populations. Warrior Networks identity and access management solutions help safeguard valuable data and applications with context-based access control, security policy enforcement and business-driven identity governance. Armed with user metrics and audit reports on user entitlements and access activities, you can deal more quickly and efficiently with the complexities of user access management, insider threats and compliance requirements.

Identity and access management solutions from Warrior will help:

Safeguard mobile, cloud and social access.

Prevent advanced insider threats.

Simplify cloud integrations and identity silos.

Deliver actionable identity intelligence.

Identity as a Service (IAAS)

Sign-on for thousands of Apps

One-Click-Access to all apps without the integration hassles. Improve security by eliminating the use of easy-to-remember, reused and/or improperly stored passwords.

Single Sign-on (SSO) from identity Service lets users access cloud, mobile and on-premises apps from any device. With single sign-on, users enter a single user name and password once and get secure access across apps and devices – based on policy from IT. Supports internal users (employees, contractors) and external users (partners, customers)

Simplify external user access with inbound federation from other identity providers.

Customize how users authenticate to Identity Service based on their security environment

User Access with inbound federation from other identity providers.

SSO for Cloud and Mobile Apps

Single sign-on has evolved. Users are accessing apps on their handhelds, in the cloud and behind your firewall — and they’re doing it from multiple locations using multiple devices.

Our solution lets you deploy browser-based apps, native mobile apps and custom apps — all with a single username and password, controlled by IT, and leveraging industry standards such as SAML.

Single Sign-on for On-premises Apps

Single sign-on doesn’t have to stop in the cloud. Provide secure behind-the-firewall access, without VPN.

No hardware to install or maintain. No firewall rules to change. No new infrastructure. No need to provide full network access.

Encrypted, dedicated, per-app access. Simple and secure.

Core Security

Attack Intelligence Platform from Warrior Networks can identify the most likely threats to your business by simulating an attack and determing exactly how that would impact your critical assets. We can substantially narrow the focus to your most vulnerable points on your network and applications by using a patented attack path simulation.

Core Security offers the industry's most comprehensive and extensible attack intelligence platform, backed by more than 15 years of applied expertise and focus on attacker behavior. Through our patented attack path planner (simulation) and attack engine (testing), the platform correlates known exploits with identified vulnerabilities and actual attacks. This is combined with other security and network data to form potential attack paths to critical business assets.

The platform is based on intelligence sharing from several key sources with this knowledge and experience shared across our intelligence and engineering teams in the form of new features, attacker patterns and exploits. Similarly, Core Impact solution is an integral part of the platform's attack path engine. When organizations simulate attack paths through Core Insight, they will utilize Core Impact to further validate and test vulnerabilities to ensure a secure environment

Data Security

Data Encryption

Protecting your data means that you are protecting your business, as a critical asset Data is subject to attacks, after all this is the key asset hackers are looking to obtain. Secure Data is part of our key business strategy and our Data Protection Solutions focus on Database Encryption, Database Backup Encryption, file encryption, and transparent database encryption. Without effective and clearly defined security policies around data it is impossible to implement data protection. Policies will define who what when and how data is accessed, and from what machines and /or application it can be accessed.

Encryption key management

Our EKM solution provides the capability to centralize all key management tasks on a single platform and effectively automate key management administration, including an automated and secure mechanism for key rotation, replication, and backup.

Monitor and report on policy

Tamper proof auditing tracks all authorised and unauthorised attempts to access protected data as well as any changes to security policies. It even tracks activities of the database administrator (DBA) with respect to sensitive data, and provides a complete audit report of all these activities. All log records are encrypted and protected.


Data protection through selective & highly secure, column-level encryption

Strong key management centralises all key management tasks

Separation of duties between security administration & database administration

Robust audit & reporting to provide insight & integrity

Application transparency designed to be implemented with no changes to existing applications

High performance, scalability and easy deployment

Support for all major relational databases, including Oracle, Microsoft SQL Server and IBM DB2. Available on industry standard UNIX, and Windows environments, as well as IBM iSeries and zSeries environments.

Database Backup Encryption

Native SQL Server backups are essentially a dump of data stored in SQL Server files. This is an inefficient and insecure way of storing backup data, as it is stored unencrypted, unprotected, and uncompressed..

Data Loss Prevention: (Symantec DLP)

DLP is pre-emptive protection of unintentional loss of sensitive information. This means being able to remediate problems in real-time, educating and alerting users without involving IT or Security personnel, and inspecting and controlling data movements in areas identified as sensitive in the network architecture. Handling such issues requires experience and hindsight.