Competențe disponibile
Auditare
Analiză / Consultanță
Design / Proiectare
Implementare soluții
Suport Tehnic Hardware & Software
Consultanță Post-implementare
Servicii de Mentenanță
NEXT GENERATION FIREWALL
Hardware or virtual solutions to secure your organization’s frontiers
Hardware or virtual solutions to secure your organization’s frontiers with added functionalities of application control, IPS, web filtering, antivirus, mobile device security and antispam.
ENDPOINT SECURITY
Software application to secure your endpoint equipment
SECURE Wi-FI
Solutions to secure and manage your Wi-Fi infrastructure
WEB APPLICATION FIREWALL
that filters, monitors, and blocks HTTP traffic to and from a web application
that filters, monitors, and blocks HTTP traffic to and from a web application. A WAF is able to filter the content of specific web applications while regular firewalls serve as a safety gate between servers. By inspecting HTTP traffic, it can prevent attacks stemming from web application security flaws, such as SQL injection, cross-site scripting(XSS), file inclusion, and security misconfigurations;
SANDBOX
Solutions to prevent zero-day attacks
EMAIL SECURITY
Secure email gateways (SEG) designed to block ransomware, phishing, and other cyber threats
Secure email gateways (SEG) designed to block ransomware, phishing, and other cyber threats seeking entry via incoming email, while ensuring that outgoing messages do not improperly leak sensitive data.
SIEM (System Information & Event Management)
Hardware or software products and services that combine security information management (SIM) and security event management (SEM)
Hardware or software products and services that combine security information management (SIM) and security event management (SEM) to provide real-time analysis of security alerts generated by applications and network hardware, to manage the log security data and generate reports for compliance purposes.
IDENTITY & ACCESS MANAGEMENT
Software application that enables the right individuals to access the right resources at the right times and for the right reasons.
Software application that enables the right individuals to access the right resources at the right times and for the right reasons. It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements.
VULNERABILITY Assesment
Software applications to evaluate the IT&C vulnerabilities and to recommend a remediation plan.
PENETRATION TESTING
Authorized simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system’s features and data