Dead-simple device security & interrogation for SMEs

Monitor and protect your endpoints. Detect, triage and block threats.

Get Started Free

Save time with a solution which tells you exactly what you need to know!

  • check Get up and running in 5 minutes. Nothing to provision or setup.
  • check Full visability of assets and applications
  • check Automatic whitelisting of applications
  • check Interrogate devices using SQL for monitoring or incident investigations.
  • check Full REST API for intergrations
Screenshot showing the system dashboard Screenshot showing assets Screenshot showing events Screenshot showing devices
fingerprint

Control

Control what applications are run across your infrastructure by defining policies. Either individually or by certificate authority.
verified_user

Secure

Zercurity provides automatic whitelisting and protection against malicious applications using our global network of sensors and active indicators.
announcement

Monitor

Zercurity provides protection to your entire IT estate. Providing you with queryable infrastructure to monitor and interrogate your environment.

FAQs

  • What is Zercurity?

    Zercurity is a hosted SaaS (software-as-a-service) that provides a secure, central platform to manage all your assets and devices, across platforms. Zercurity enabled you to interrogate, detect, triage and block threats. Uisng an advanced SQL interface. Zercurity centrally manages white/blacklisting for applications. Zercurity will automatically block unknown or malicious applications.

  • Why was Zercurity created?

    Managing the security and policy compliance of assets and devices within an organisation is a nightmare. Zercurity aims to simplify this by; allowing you to have complete visibility on what's happening across your hosts and devices. Giving you peace of mind that your policies are being adhered too.

  • Who is Zercurity for?

    Zercurity is built for small-to-medium-sized businesses who require both coverage and an understanding of their compliance and security posture.

    Organisations may also want to fulfil a role of enabling IA (Intrusion Analysis) and ID (Intrusion Detection) and or incident response (Something not typically provided with AV).

    We also offer on-premise options for larger companies that are interested in using Zercurity.

  • Is my data in Zercurity secure?

    Yes. We strive to ensure that the data stored within Zercurity is as secure as possible. We never store passwords as plain text.

    All network traffic is encrypted over TLS with at least 128-bit AES encryption. Client data is segregated and your data is stored within AWS.

    Zercurity is deployed using a serverless architecture therefore no sensitive data is ever at rest. All databases and backups are encrypted.

    Our entire engineering team has come from a security background. Have additional questions or concerns? Get in touch.

  • How much does Zercurity cost?

    It's free upto 5 hosts. Thereafter, Zercurity costs £4 GBP per month per host.. No contract. No lock-in. Cancel at any time. Virtual machines are counted as a host.

  • What is Whitelisting / blacklisting?

    Zercurity allows for three modes of operation when it comes to restricting the execution of binaries on host machines.

    BLOCKING Only allow approved applications to run. These are defined by an a administrators policy.

    PERMISSIVE (Default) Only allow whitelisted and pre-approved applications to run on the host machine. Zercurity uses its collective knowledge base to profile applications and automatically allow them to run or restrict known bad applications.

    Unknown applications are blocked by default but are profiled within minutes and automatically approved if deemed safe.

    MONITOR Allow users to run any application they want, with the exception of known bad applications.

  • What is Host based querying?

    Zercurity allows customers to construct SQL (Structured Query Language) queries to be executed as either a scheduled, or run once-only, queries. These queries can gather a whole range of telemetry from; processes, open files, listening ports, kernel modules,applications. You can interrogate every aspect of a remote system

    Zercurity uses OsQuery a tool developed by Facebook.

    An extensive list is available here.

  • Do you provide an on-site solution?

    Yes. Please get in touch for an on-site solution.

  • Do you offer support plans?

    Email support is included. If you require something more comprehensive. Please get in touch.