Cyber Security

Advanced Threat Protection (ATP): a category of security solutions that defend against sophisticated malware or hacking-based attacks targeting sensitive data, Advanced threat protection solutions can be available as software or as managed services.

Automated Security Awareness Platform: is a new web-based learning system which automates cyber-awareness training for companies of any size. The platform helps businesses to address gaps in employees' cybersecurity skills and knowledge, with each lesson taking less than 10 minutes to complete.

Cloud Access Security Broker (CASB): is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. A CASB acts as a gatekeeper, allowing the organization to extend the reach of their security policies beyond their own infrastructure.

Cloud Security & SaaS Solutions: SaaS cloud security solutions are changing Security DevOps and the way enterprises protect critical web applications. SaaS cloud security technology simplifies implementation – there is no hardware or software to install or maintain – and can scale easily for multiple business units and development teams.

Data Encryption: translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. 

Data Loss Prevention (DLP): Data loss prevention software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.

Deception Solution: a solution that combines network and endpoint high-interaction deception lures and decoys designed to provide early visibility into in-network threats, efficient continuous threat management, and accelerated incident response.

Email Security: refers to the collective measures used to secure the access and content of an email account or service. It allows an individual or organization to protect the overall access to one or more email addresses/accounts.

Endpoint Detection & Response (EDR): is a cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats. It is a subset of endpoint security technology and a critical piece of an optimal security posture

File Integrity Management: is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.

Fraud Prevention: Tackle online fraud and account takeover, insurance fraud and promo abuse. Fraud costs businesses 1.8% of revenue, are you spending too much? Comply with PSD2. Prevent Online Fraud. Stop Promo Abuse. Reduce Chargeback Losses. Detect Synthetic IDs.

Identity & Access Management: is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrella of IT security and Data Management.

Industrial Security: is a concept that refers to a series of security activities that protect resources and minimize risk and loss to prevent leakage of key technologies and confidential information at the enterprise level, and affect national problems as well.

Mobile Device Management (MDM): is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of mobile devices.

Next Generation Firewalls (NGFW): is a “deep-packet inspection firewall that moves beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and bringing intelligence from outside the firewall.”

Next Generation IPS (NGIPS): A Next-Generation Intrusion Prevention System (NGIPS) offers a logical and essential progression of capabilities needed to protect networks from emerging threats.

SIEM Solution: is a software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware.

Threat Intelligence: is the analysis of internal and external threats to an organization in a systematic way. The treats that threat intelligence attempts to defend against include zero-day threats, exploits and advanced persistent threats (APTs), Threat intelligence is also known as cyber threat intelligence (CTI).

User and Entity Behavior Analytics (UEBA): is a type of cyber security process that takes note of the normal and abnormal conduct of users, aggregate the data you have in your reports and logs, as well as analyze file, flow, and packet information.

Vulnerability & Patch Management: is a pro-active approach to managing network security. It includes processes for: identifying vulnerabilities and figuring out how to prevent vulnerabilities from being exploited by patching all the affected areas in a timely way.

Web Application Firewall (WAF): A web application firewall filters, monitors, and blocks HTTP traffic to and from a web application. A WAF is differentiated from a regular firewall in that a WAF is able to filter the content of specific web applications while regular firewalls serve as a safety gate between servers.