Solutions

Infrastructure Security

Asset management
Identification of assets connected to the company's network, in particular the cloud, and their vulnerabilities representation.

Vulnerability management
Preventive risk reduction and network vulnerability analysis. Protection through patching or removing unused vulnerable hosts from the network infrastructure.

Compliance monitoring
Data collection and IT systems configuration inventory, the integrity of critical files and directories specified in the monitoring profile and the capture of critical data for revision control.

Data Analytics Platform
Data collection from any devices and systems, raw data management, monitoring, analytics of IT infrastructure, information security and business activity, SIEM functions.

Privileged accounts management and security
Systems of privileged login information management, setting up of regular password change policies, recording sessions and privileged sessions monitoring.

Security Operation Center
Organization and automation of the security management centre. SOC tools enable analysts to obtain reliable information about incidents and respond to them quickly.

SCADA Security
Protection against attacks on SCADA industrial automated systems, intelligent analysis and response to the company's SCADA network events; traffic control.

 

Network Security

WEB filtering
Controls access to prohibited sites; prevents access to dangerous Internet resources that spread malware; phishing sites. Also serves as a sandbox.

DDos prevention
Effective protection against today's cyber attacks - Distributed Denial of Service (Distributed denial of service).

Next Generation Firewall
A solution aimed at preventing real-time threats: protection against APT and unknown malicious «Zero-Day» attacks at the network level, protection against cryptologists and the use of Anti-Bot technology.

Sandbox
Analysis of attachments and e-mail addresses downloaded from files and URLs for the presence of malicious code by launching them in an isolated environment and real-time studying of their behaviour.

Unified Firewall Management
Increases the corporate network level of security, updates the data on the network topology, of device configuration, simplifies the implementation and monitoring of changes in the network infrastructure.

 

IT-services Security

MAIL filtering
Provides email protection, spam and phishing filtering, outgoing mail encryption; performs a sandbox function (launching a URL, studying the attached files behaviour).

WEB App Security
Maximum web resource protection against SQL injection, CSS, Broken Authentication and Session Management, etc. using the world's best solutions.

 

Endpoint Protection

Endpoint Detection and Respond
The system of monitoring and security of workstations gives an opportunity to eliminate the threats associated with the activity of malware and spyware, through their in-depth analysis and carrying out appropriate actions.

 

Data Security

Database Security
DAM (Database Activity Monitoring) and DBF (Database Firewall) help to control attacks aimed at the company's critical assets, such as databases.

File Security
Audit and monitoring of an access to files; analysis and management of users rights of access to files; alerts and reporting changes in AD etc.

Data Leak Prevention
Prevents leakage of information through monitoring and control of http, ftp, smtp, endpoint; Search for confidential information on network resources and workstations.

Cloud Access Security Broker
Cloud protection. Guaranteed access to cloud resources, data warehouses, endpoints and applications.

 

Protection against Fraud

User and Entity Behavior Analytics
Tools for behavioral analysis and collecting logs about the actions of users and administrators in business-critical systems and applications.

 

Training & Simulation of Threats

Threat Prevention Training and Simulation
The specialists training course, particularly on setting up the environment, which simulates the organization’s IT infrastructure, setting up types and scenarios of attacks, and generating traffic to model attacks.

Phishing Simulation Service
The service of staff training in anti-phishing and responsing to it through working out attack scenarios, analyzing information after following links or opening attachments.