Lithik Security Manager: The Ultimate Security Management Tool

The Lithik Security Manager surrounded by snapshots of common tasks

TRY IT NOW!
Free for 1 month

Vulnerabilities: TERMINATED

Don't just protect vulnerabilities from attack; remove them entirely. Automatically applying patches and fixing insecure configurations drastically reduces the number of ways a hacker even has a chance to get in.

Stylized fabric patch

Third party patching

Common software is upgraded as soon as new security fixes are released, or on a preconfigured delay.

Hollow circle with slice removed

Vulnerability mitigation

Proprietary routines detect and repair insecure configurations that can't be fixed with a patch.

Windows logo

Windows updates

New packages are installed automatically at non-disruptive times, either from a WSUS cache or directly from Microsoft.

Power icon with arrow on right side

Rebooting

Machines are rebooted after an installation finishes, and only when its safe and convenient to do so.

Automate the jobs you hate

See this stock photo of an IT department having a meeting? They have the time to pay attention to more important projects because the Lithik Security Manager is taking care of all the grunt work in the background. Thoroughly, continuously, automatically.

Watermarked cheesy stock photo of diverse people having a pretend business meeting.

Network-wide scans, updates, reboots, fixes, and more are all handled in the background based on a powerful and flexible automation scheduler that can be customized to fit any network requirements.

One console to rule them all...

Total visibility has never been simpler. A single, straightforward web interface makes it easy to browse device inventory, reset user passwords, check on antivirus status, etc., rather than having to keep tabs on all of those individually.

Blue lines connecting the various data the LSM reports

Secure from day 1

Start with safe, secure settings that automatically build and maintain network immunity against attack as soon as automation is enabled. Tweaking is optional and only takes a few minutes more.

Padlock with the number 1 as a keyhole
Padlock with the number 1 as a keyhole

Feedback that makes you more effective

When connectivity is impaired or a device isn't cooperating, get diagnostic detail about the problem and its solution. Stay informed about errors that are occurring or minor policy adjustments that could be made to dramatically improve security.

Reports you'll actually want to read

  • Customize what's relevant.
  • Create an actionable to-do list for technical staff.
  • Create high-level compliance reports that prove the job is getting done.

What people are saying...

"I trust the Lithik Security Manager to keep my environment patched and up to date. The ability to reliably patch third party software has eluded us for a long time due to budgetary and time constraints; the Lithik security manager has cured that problem."
Greg Lawless, IT Manager
Over 400 workstations & 6 locations
"Since we installed the Lithik Security Manager we have not gotten any dings on the IT portion of a state or federal examination."
CEO of regional bank
200 workstations and 25 servers
"My IT staff used to stay until midnight on patch Tuesdays to get everything applied, now with the LSM they don't work late that day anymore. I would have to hire additional IT staff to cover all the things the LSM does."
Chad Hoffman, President and CEO
Richwood Bank
"I refer to LSM many times throughout the day to check inventory of devices across the WAN and get reliable detailed and current information. LSM is much more effective and useful for this than Lansweeper."
IT Administrator
Non-profit with over 350 users
"I really like the flexibility Lithik offers to customize reporting to our needs. It is a powerful window into our systems and security."
CIO of regional bank
250+ users in 7 locations
"Lithik prompts and equips us to perform much needed but often over-looked network security management. It's not necessary to be a security engineer if you have their tools packaged into a nifty appliance like this."
Dan Walker, IT Administrator
450 workstations and over 25 servers
TRY IT NOW!
Free for 1 month

The results speak for themselves.

A graph showing a sharp decrease in the number of vulnerabilities after engaging the Lithik Security Manager

This is a graph of real customer data. This customer already had a patch management system in place, but it wasn't getting the job done. The Lithik Security Manager cleaned up the entire network in a matter of days and kept it there straight on through Patch Tuesday, bringing their risk factor nearly down to 0. That's why we do what we do.


Notable Features

  • Automation
    • Policy Driven
      • Group by...
        • Network Segment
        • Active Directory Domain
        • Active Directory Organizational Unit (OU)
        • Active Directory Role
        • Include/Exclude based on these categories, or manually per device
      • Priorities for each policy, so that whatever is most important takes precedence
    • Schedule
      • Independent time windows for weekdays, Saturdays, and Sundays
      • Run tasks daily, weekly, monthly, or a custom frequency
      • Delay patch application, allowing distribution to a test group before the rest of the domain
    • Vulnerability Scanning
      • Support for industry-standard Nessus and the free OpenVAS
      • Optionally, override WSUS for accurate results even when WSUS misbehaves or does not have a patch available
    • Reboot
      • Force reboots even when somebody stays logged into a workstation overnight, so patches actually get applied
      • Reboot redundant devices sequentially, so you always have a domain controller available
    • Windows Patching
      • Update all Microsoft produces, including things like Office and SQL server
      • Apply either all updates or only security patches
      • Optionally, override WSUS for more thorough results
    • Third Party Software Patching
      • Automatically apply updates for a broad range of frequently attacked software
    • Vulnerability Fixes
      • Custom routines fix insecure configurations that can't be fixed with a patch
  • Alerts
    • Broad variety of event categories
      • Devices
      • Software
      • Vulnerabilities
      • User
      • Network
      • Database
      • System noticies
    • Custom thresholds for when to send an alert
    • Send to individuals or a distribution list
  • Reports
    • Customizable level of detail to suit the audience
    • CSV and TXT reports available for custom uses
    • Monthly or on-demand reporting cycle
    • Send to individuals or a distribution list
    • Notify recipient or send report as attachment
  • Inventory
    • Detailed listing of all the important things on a network
      • Devices
      • Software
      • Antivirus
      • Vulnerabilities
      • AD users and groups
      • Databases
    • Sortable, filterable inventory tables
      • Filter by text or regular expression
    • Drill down for more detail
      • Nearly everything in the inventory can be clicked to provide more detail when you need it
    • Action steps to make your network more secure are automatically generated and prioritized
  • Setup
    • System requirements
      • Scanning appliance can be installed on hardware or as a virtual machine
      • Appliances hosting vulnerability scanners require more resources, but auxilliary appliances can be quite small
      • Unlimited appliances per license
      • Requires internet access to communicate with cloud control
      • Credentialed access works out-of-the-box for any Windows device using an AD account
      • Setup for SSH devices (Linux, Mac, ESXi) is streamlined and quick
    • Network
      • Customize managed subnets
      • Manually exclude certain subnets or IPs
      • Configurable per-subnet cache servers
    • General
      • It just works - turn it on and you're halfway done!

Try it now!

Contact us today and we'll set you up with a free trial so you can see for yourself!

© 2016 Lithik Systems, Inc.
635 Park Meadow Road, Suite 208, Westerville, OH 43081