A comprehensive security approach requires solutions and services that ensure the security of data, infrastructure and the user throughout the duration of threats. We can help you manage these threats with the three pillars of security management: Protect-Detect-React.
Data Loss Prevention (DLP)
These days, it is imperative that we monitor and control critical information and develop a comprehensive data security strategy to keep data confidential. Incidents such as data leakage or disclosure of sensitive data by unauthorized personal, deliberate or accidental makes personal information to be monitored, filtered, detected and blocked.
A data loss prevention (DLP) system identifies sensitive data – moving or at rest – to ensure that they are not exposed to unauthorized access and potential threats. The significant reduction of the risks regarding the internal threats that can lead to data leaks or thefts by observing the different rules and regulations has in view the coverage of the following:
- Data leakage / Data loss / Data theft
- Uncontrolled use of appliances
- Mobile equipment management
- Non-compliance with regulations
- Low productivity
Forcepoint collaboration (world leader in DLP solutions), as well as with CosoSys allows us to implement both enterprise solutions and SMEs solutions for ensuring not only the support and installation through our certified specialists but also the necessary equipment.
As the threat landscape continues to grow rapidly, traditional firewalls lag behind and endanger your organisation. Next generation firewall (NGFW) gives organisations application control, intrusion prevention, and advanced network visibility.
Next-generation firewalls are a class of firewalls that are implemented in either software or hardware and are able to detect and block complicated attacks by applying security measures at the protocol, port, and application levels.
Next-generation firewalls are better able to detect application-specific attacks than standard firewalls and thus can prevent worse malicious intrusions. They perform a complete inspection of the packages checking the signatures and the payload of the packages for any anomalies or malware.
Password-only authentication has led to security breaches, malware infections, and breaches of privacy policies. In two-factor authentication, a password is used in conjunction with a security token and an authentication server to provide much better security. Authorised employees can access the company’s resources securely using a variety of devices, from laptops to mobile phones.
FortiToken Mobile from FortiNet is an application for iOS or Android that acts as a hardware token, but uses the hardware that most users have, a mobile phone.
FortiToken Mobile includes:
- Reduce costs by using existing FortiGate services as an authentication server
- Speed in connection through the unique activation method
- A scalable solution for low costs
SafeNet eToken 5110 from Thales offers two-factor authentication for secure remote access and networking, as well as certificate-based support for advanced security applications, including digital signature and pre-boot authentication.
WEB Applications Firewall (WAF) & DDoS
Web Application Firewall or WAF helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It commonly protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion and SQL injection, among others.
A WAF works through a set of rules often called policies. These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF comes in part from the speed and ease with which policy change can be implemented, allowing for a faster response to different attack vectors; During a DDoS attack, rate limitation can be quickly implemented by modifying WAF policies.
Radware and Fortinet, our traditional partners, offer both WAF and DDoS solutions, ICSA Labs certified solutions and PCI compatible that combine positive and negative security models to provide complete protection against web application attacks, web application attacks behind CDNs, manipulations API, advanced HTTP attacks (slowloris, dynamic floods) brute-force attacks on login pages and more. Our specialists are certified to deliver, install and customise these applications.
Web & Email Security
Too much spam? Are you facing a significant amount of unsolicited emails? Are messages received late by recipients? Is the mail server frequently blocked on spam lists? Are there any difficulties in the activity of the employees and in the operation of the mail server?
FortiMail is the antispam, antivirus, antimalware solution from Fortinet:
- Suitable for all business segments, from small to enterprise.
- Quick installation and configuration (appliance solution). Does not involve special network installation requirements.
- Flexibility in operation with intuitive web-based interface, accessible from mobile devices.
- Enterprise antispam and antivirus facilities.
Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks. Advanced capabilities detect data theft concealed in images or custom-encrypted files, even when gradually transmitted in small amounts to evade detection. The rich data collection capability can quickly generate a report on Indicators of Compromise to identify infected systems and suspicious user behavior.
A secure web gateway offers protection against online security threats by enforcing company security policies and filtering malicious internet traffic in real-time. At a minimum, a secure web gateway offers URL filtering, application controls for web applications and the detection and filtering of malicious code. Data leak prevention features are also essential. Secure Web Gateway from Forcepoint is “cloud security you can trust” – delivered at a global scale.
You need to secure communication between distant points? Are you looking for secure storage, integrated deduplication, compression, saving and fast data recovery for hybrid environments (physical / virtual / cloud) in granular mode (Active Directory)?
Arcserve Backup hight end security:
- Eliminates the risks and costs associated with data loss.
- Main functions: infrastructure visualisation, granular restoration of Active Directory, data archiving, copying the backup to the cloud for storage, snapshot and backup at the level of integrated files, synthetic full backup.
- Centralised control of data backup and restore activities.
- Provides advanced tape management and consistent server visualisation.
- It has a disaster recovery option based on the pre-installed Windows® environment.
- 100% integrated and functional solution, delivered turnkey based on specific requirements. Native compatibility with equipment and applications already present in the IT environment.
- Extended scalability. Interface multiple archiving and backup systems in the same management console.
Free your stress of keeping your data intact by eliminating the manual processes associated with data protection, recovery, monitoring, ransomware protection. Veeam saves you time and money, allowing you to focus less on backup and more on running your business.
Veeam solutions offer powerful and reliable data protection capabilities that can be effectively deployed in the cloud, virtual and physical environments for all major platforms and enterprise applications. As your business enters the digital age, you’ll want to make sure you’ve purchased a data protection solution that integrates with the data centre strategy you work with.
PKI (Public Key Infrastructure)
Public Key Infrastructure (PKI) is a technology for authenticating users and devices in the digital world. The basic idea is for one or more parties to digitally sign documents to be attested with a specific cryptographic key belonging to a specific user or device. The key can then be used as a user identity in digital networks.
Technically speaking, it is a set of roles, policies, hardware, software and procedures required to create, manage, distribute, use, store and revoke digital certificates and manage public key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of networking activities, such as e-commerce, internet banking and confidential e-mail. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information transferred.
SIEM (Security Information and Event Management)
Security Information and Event Management (SIEM) use rules and statistical correlations to turn logs and events in security systems into actionable information. This information can help security teams detect real-time threats, manage incident response, conduct investigations into past security incidents, and prepare for compliance audits.
SIEM security platforms can aggregate both historical data and real-time events and establish relationships that can help security personnel identify anomalies, vulnerabilities and incidents. The main focus is on security incidents and events, such as successful or failed authentications, malware activities, or privilege escalation. This information can be sent as notifications or alerts or discovered by security analysts using the visualisation and on-board tools of the SIEM platform.