Network perimeter protection
Protection of hardware, software, data and personnel
Protection of workstations
A comprehensive response to attacks on servers, computers, tablets and mobile devices
SOC. Construction of a security operations centre
A centralised division of a company that combines SIEM technology, people and processes
Account and Privileged Access Management
Audit of actions, control of access, authentication and authorisation of process control
DLP. Data Leak Protection
Hardware and software technology for preventing leaks of confidential information outside the company
MDM. Mobile Device Management
Control and protection of mobile devices used by the organisation and staff
SIEM. Security Information and Event Management
Combination of network activity into a single address data set
Deception technology
real-time detection, analysis and protection against zero-day attacks and other complex attacks
Protection of Office 365 and web traffic
Protection of email systems from complex, unknown and unusual threats, and checking of traffic
Network telemetry and anomaly detection
A mechanism for dealing with advanced threats using network activity analysis
CASB. Cloud Access Security Broker
Cloud security technology
Vulnerability Scanning, Discovery and Management
Preventive measures for reducing information security risks