IT&C Security Solutions

Competențe disponibile

Auditare

Analiză / Consultanță

Design / Proiectare

Implementare soluții

Suport Tehnic Hardware & Software

Consultanță Post-implementare

Servicii de Mentenanță

NEXT GENERATION FIREWALL

Hardware or virtual solutions to secure your organization’s frontiers

Hardware or virtual solutions to secure your organization’s frontiers with added functionalities of application control, IPS, web filtering, antivirus, mobile device security and antispam.

ENDPOINT SECURITY

Software application to secure your endpoint equipment

SECURE Wi-FI

Solutions to secure and manage your Wi-Fi infrastructure

WEB APPLICATION FIREWALL

that filters, monitors, and blocks HTTP traffic to and from a web application

that filters, monitors, and blocks HTTP traffic to and from a web application. A WAF is able to filter the content of specific web applications while regular firewalls serve as a safety gate between servers. By inspecting HTTP traffic, it can prevent attacks stemming from web application security flaws, such as SQL injection, cross-site scripting(XSS), file inclusion, and security misconfigurations;

SANDBOX

Solutions to prevent zero-day attacks

EMAIL SECURITY

Secure email gateways (SEG) designed to block ransomware, phishing, and other cyber threats

Secure email gateways (SEG) designed to block ransomware, phishing, and other cyber threats seeking entry via incoming email, while ensuring that outgoing messages do not improperly leak sensitive data.

SIEM (System Information & Event Management)

Hardware or software products and services that combine security information management (SIM) and security event management (SEM)

Hardware or software products and services that combine security information management (SIM) and security event management (SEM) to provide real-time analysis of security alerts generated by applications and network hardware, to manage the log security data and generate reports for compliance purposes.

IDENTITY & ACCESS MANAGEMENT

Software application that enables the right individuals to access the right resources at the right times and for the right reasons.

Software application that enables the right individuals to access the right resources at the right times and for the right reasons. It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements.

VULNERABILITY Assesment

Software applications to evaluate the IT&C vulnerabilities and to recommend a remediation plan.

PENETRATION TESTING

Authorized simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system’s features and data