1. Is ACSIA a combined EDR, IDS, IPS and SIEM?
2. Does ACSIA contain an Anti-virus or Spam prevention capability?
3. How does ACSIA operate in terms of blocking IP addresses, and how does ACSIA push updates to the host/server to block various events?
4. Can the user roll back changes at the server level using the UI?
5. Will ACSIA ever block IP subnets instead of specific IP addresses from where a threat emanates?
6. What format of log files does ACSIA accept?
7. Does ACSIA have a published API for integration into other products?
8. What are the platform prerequisites for an ACSIA deployment?
9. We have a lot of servers/platforms (thousands) all over the world. Can ACSIA scale to this degree?
10. How long does it take to deploy ACSIA in a typical installation?
11. Are monitored endpoints deployed with ACSIA agents?
12. Can the ACSIA XDR Plus engine and Client Agent be upgraded, or is a new install required?
13. Does the ACSIA Server monitor and protect itself and if so, does that consume an end-user license subscription?
The ASCIA XDR server is protected by ACSIA without consuming an endpoint client license.
14. Is ACSIA a solution to protect from a DDOS attack?
Currently, the answer is no, but we plan to integrate Cloudflare or Akamai DDOS protection in 2023
15. What does Acsia do automatically when there is an attempt to encrypt data by ransomware?
ACSIA operates multiple levels of defense which would prevent this occurrence.Our proactive and predictive defense layers prevent the ransomware executable being deployed inside a customers environment - so our solution is designed to be much more proactive than a solution designed to detect the ransomware once deployed in an environment.
16. Does the ACSIA solution work for VMware hosts?
If the question is referring to Virtual Hosts (Guests) deployed in an ESX host, then the answer is yes, ACSIA will protect these deployments.
If the question refers to the ESX hypervisor itself, then this is not currently available but is in our development plans for 2023.
17. How can storage be expanded?
The storage provisioning is typically done at the VM side which is hosted by the customer. So when creating the VM to host ACSIA it is important to keep in mind the filesystem structure to be configured as an LVM. Having an LVM will enable you to expand the storage if in the future you find out that the actual storage is not enough.
18. Do we have any backup strategy?
ACSIA itself doesn’t have an external backup strategy. Typically the external backup is done at the infrastructure level and every business has its own ways and tools of performing backups. So whatever backup solution you use you can apply the same to ACSIA (i.e. snapshot of the entire VM etc).
19. Can a temporary backup be implemented to facilitate a roll-back if an ACSIA Upgrade fails?
ACSIA has already a roll-back solution in place in case the upgrade fails. You can find detailed information about this in the installation guide.
20. Can ACSIA protect NAS equipment?
NAS systems are basically custom Linux operating systems and in theory, should be compatible with ACSIA. However these device types are not our core market, so please engage with our support team if you would like to investigate this further.
Please visit the ACSIA Help Centre at: https://support.4securitas.com/hc/en-us/