Technological Solutions

Cybersecurity solutions in both SW and Appliance format to cover the complete cybersecurity cycle in organizations. Most of them are already available for on-premise or cloud deployment.

Platforms & Networks hardening

Solutions aimed at strengthening communication platforms and networks against cyber threats

  • Systems Basing (DMZ, etc.)
  • Load balancing
  • Data Backup Systems
  • Firewalling Solutions
  • Network Configuration Management Solutions (CMDB)

Prevention

Preventive measures aimed to minimize risk exposure

  • Audit Applications
  • Asset Vulnerabilities, DDBB and Web apps scanners
  • SW patching / firmware (Automatic Patch System)
  • Data Loss Prevention Systems (DLP)
  • Identity Management Systems

Detection

Solutions focused on cyber attack monitoring and detection

  • Vulnerability Databases (CVE, CVSS and CPE) and Blacklists
  • Attack Detection and Monitoring System (IDS / IPS and Manager)
  • Flow Exporters
  • SIEM (log storage and processing)

Analisys & Intelligence

Solutions for elaboration of cyberintelligence through the fusion, correlation and aggregation of information.

  • Event correlation (SIEM) from various sources (wifi, social, IDS, DLP, UEBA, etc)
  • Applications of Ethical Hacking and Pentesting
  • Forensic Analysis Applications: (static, dynamic and runtime malware analysis, device analysis, writeblockers, etc)
  • Digital Surveillance (Cyberintelligence): web crawlers or spiderbots for collecting information from the web.

Defence and Response

Protection solutions against cyber attacks

  • Attack Containment (IPS Active Traffic Cut Sensors)
  • Deception through deployment of Honeynets-trap networks (users, files and servers)
  • Disaster recovery (service recovery)
PARTNERS
AMBAR
ACORDE Sistemas
CISGA
REDBORDER
NOZOMI
PROOFPOINT
DIGITAL GUARDIAN
BLUELIV
ENDPOINT PROTECTOR
MANAGE ENGINE
KASPERSKY
OARO
METACLEAN
SQS
LEET
ITCL