Network perimeter protection

Protection of hardware, software, data and personnel

MORE

Protection of workstations

A comprehensive response to attacks on servers, computers, tablets and mobile devices

MORE

SOC. Construction of a security operations centre

A centralised division of a company that combines SIEM technology, people and processes

MORE

Account and Privileged Access Management

Audit of actions, control of access, authentication and authorisation of process control

MORE

DLP. Data Leak Protection

Hardware and software technology for preventing leaks of confidential information outside the company

MORE

MDM. Mobile Device Management

Control and protection of mobile devices used by the organisation and staff

MORE

SIEM. Security Information and Event Management

Combination of network activity into a single address data set

MORE

Deception technology

real-time detection, analysis and protection against zero-day attacks and other complex attacks

MORE

Protection of Office 365 and web traffic

Protection of email systems from complex, unknown and unusual threats, and checking of traffic

MORE

Network telemetry and anomaly detection

A mechanism for dealing with advanced threats using network activity analysis

MORE

CASB. Cloud Access Security Broker

Cloud security technology

MORE

Vulnerability Scanning, Discovery and Management

Preventive measures for reducing information security risks

MORE