- Network Security
- IT Infrastructure Security
- WEB application protection
- Comprehensive audit of information security
- A set of measures for compliance with the requirements
Network Security
- Firewall (NGFW,FW, UTM, IPS/IDS)
- Virtual Private Networks (VPN)
- Network access control (NAC)
- Network anomaly detection (NAD)
- Systems for analyzing and optimizing firewall policies
IT Infrastructure Security
- Email Security
- Protection against rogue end devices
- Trusted Boot Tools
- Antivirus protection tools
- Security Analysis Scanners
- Internet access protection
- Multi-factor authentication (MFA)
- Honeypot
- Advanced Threat Detection at Endpoints (EDR)
- Centralized authentication management systems
- Public Key Infrastructure (PKI)
- Protecting corporate resources through TLS VPN
- Protection against targeted attacks
- Protecting the virtualization environment
WEB application protection
- Web Application Firewall
- Аудит безопасности исходного кода
- Ensuring ICS cybersecurity:
- Analysis of anomalies in industrial protocols (INAD)
- Endpoint Protection
- Industrial firewalls
- Unidirectional gateways
Comprehensive audit of information security:
- Audit of processes and information flows
- Audit of existing information security systems
- Analysis of the effectiveness of the applied means and methods of information protection
- Security audit of IT infrastructure and information systems