Enabling mobile employees, home workers, extranet partners, customers and other authorized users to remotely access business critical applications and resources over a VPN connection.
Next Generation Firewalls (NGFWs) blend the features of a standard firewall with quality of service (QoS) functionalities in order to provide smarter and deeper inspection. In many ways a Next Generation Firewall combines the capabilities of first-generation network firewalls and network intrusion prevention systems (IPS), while also offering additional features such as SSL and SSH inspection, reputation-based malware filtering and Active Directory integration support.
IPS systems are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, and attempt to block/stop it. In other words, it provides policies and rules for network traffic along with an intrusion detection system for alerting system or network administrators to suspicious traffic, but allows the administrator to provide the action upon being alerted.
Solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. This is a method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy.
A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
Security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.
PKI forms the foundations for managing public/private key pair which is the key foundation for several application domains such as document signature, transaction signing, SSH, etc.
Also called strong authentication and 2FA. It helps in providing strong assurance of an entity identity by, for example, using smart card, soft and hard tokens, mobile based authentication, biometrics, etc.
Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications.
Identity governance (which is not the same as GRC) is another emerging domain under the IAM umbrella which bridges businesses with IT by enabling business owners to directly influence the technical account, role and entitlement management based on business functions.
It is frequently used as an information security and governance tool to help companies in meeting compliance regulations and to prevent internal data breaches through the use of privileged accounts. The management of privileged identities can be automated to follow pre-determined or customized policies and requirements for an organization or industry.
An approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Endpoints can include PCs, laptops, smart phones, tablets and specialized equipment such as bar code readers or point of sale (POS) terminals.
Web Filter: is to detect incoming Web page to determine whether some or all of it should not be displayed to the user. The filter checks the origin or content of a Web page against a set of rules provided by company in category based and to in some advanced features to scan the content of the Web pages to detect any threats of incoming web traffic.
Email Filter: Solution delivers unrivalled protection from spam with a unique combination of spam protection, antivirus and advanced content control.
It is a solution of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.
Computer forensics is the collection, preservation, analysis and presentation of computer-related evidence. In summary, it helps determine the WHO, WHAT, WHERE, and WHEN related to a computer-based crime or violation.
Security software used by an IT department to monitor, manage and secure employee’s mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization. Mobile device management software is often combined with additional security services and tools to create a complete mobile device and security management solution.
It is used to categorize unstructured data aiming to understand its value from business perspective.
Solution is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting & blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage). By insure that end users do not send sensitive or critical information outside of the corporate network.
It’s cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. By proactively scanning your environment for misconfigurations, vulnerabilities, and malware and provides guidance for mitigating risks.
Patch management is the process of using a strategy and a plan of what patches should be applied to which systems at a specified.
Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. In other word, encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can.
This new generation of security tools checks conformity of application flow (HTTP or HTTPS) either to standards, pre-established rules or expected request types. These rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection. By customizing the rules to your application, many attacks can be identified and blocked.
Application Delivery Controller (ADC), an advanced traffic management device that is often also referred to as a web switch, content switch, or multilayer switch, the purpose of which is to distribute traffic among a number of servers or geographically dislocated sites based on application specific criteria.
Identify phishing content contained in websites and e-mail, to help users recognize Web phishing, many anti-phishing service features are responses to efforts to hack a system and steal data.
Database management systems (DBMS) is a technology platform where critical enterprise data resides. Auditing and monitoring such sensitive platform is critical for enterprises.
Traffic manager is a load balancing technology aiming to distribute network access traffic amongst available service access points.
External DNS Security intelligently detects and mitigates DNS attacks while responding only to legitimate queries.
URI filtering is the technology used to control URI requests by blocking or allowing them.