Implementation of a comprehensive corporate antivirus system ensures:
- Control of all possible virus channels - email, network protocols allowed to interact with the Internet (HTTP, FTP), external data storage media (floppy discs, CD, DVD, flash- cards, etc.), file servers
- Continuous anti-virus monitoring and regular anti-virus scan of all servers and workstations
- Protection of mobile devices, etc.
- Protection against various types of threats - viruses, network and email worms, Trojan horses, unwanted programs (spyware, adware, etc.)
- Automatic notification of viruses enfection and treatment
- Phishing Scams
IPS (Intrusion Prevention System)
The Corporate Intrusion Prevention System monitors and reports on all data streams entering your corporate network, and takes a proactive approach to block any potential hazards. It hardens your company against any hostile influences. The Corporate Intrusion Prevention System is a component of the company security suite and is a scalable, flexible, cost-effective, and comprehensive solution of fortressing your company in the e-business world.
We use products of leading vendors: Cisco IBM Proventia, Stone Soft
IDM (Identity Management)
The Corporate Identity Authentication System provides hardware-controlled authentication of users with access to sensitive information. It uses tokens - small devices in the form of USB- pendants and smart cards to control access. Tokens can be used for storage of multi-symbol passwords, users' personal data, digital certificates and integrated with access control to premises, staff T&A systems, etc.
We use products of leading vendors:
Firewall/VPN (Firewall/Virtual Private Network)
Firewalls ensure a secure connection of the corporate network to public networks based on your security policies. This creates a reliable protection of the organization's perimeter, ensuring control of information flows between the corporate network segments, as well as limiting access to internal (published) resources of the corporate network from outside.
The Corporate Protection System for communication channels (VPN) provide the client's employees and partner a secure environment to transfer confidential information over the internet, guaranteeing the data's integrity and authenticity.
We use products of leading vendors: Cisco, Stone Soft, Juniper, McAfee
Web/URL Security Gateway
The control system for incoming web traffic scans and analyzes the data flows (packages) received in response to user requests (e.g. from your website) for potential danger. The system isolates malicious traffic from the organization's internal network in real time, preventing possible threats to information security.
We use products of leading vendors: McAfee, WebSense
The backup system is a hardware and software solution designed to create additional copies of critical information. It is a key component of your business continuity strategy. According to Gartner, among the companies affected by disasters or having experienced major loss of corporate data (for any reason), 43% were unable to continue their business due to the lack of a backup system. Don't be caught by the unexpected, when it's so easy to prepare for it.
We use products of leading vendows: Symantec, Acronis
here are dozens of ways to recover information you thought was deleted. Secure deletion of information prevents leakage of critical information that you thought had been destroyed. Frequently some data have strictly limited shelf lives, and must be destroyed after a certain date. When that is the case, we can remotely select this specific data and permanently destroy it, so that it is unrecoverable from then forward. Your data and your company are thus protected.
We use products of leading vendors: Blancco
SIEM (Security Information and Event Management)
In large, geographically diverse organizations the number and variety of events related to security can make it impossible to manually collect and analyze them for potential threats. As a result, threats can go unnoticed, and unresponded to, leaving the company in a vulnerable position.
At the same time, there may be no clear procedures for investigation and response to incidents that are discovered.
As a result, serious vulnerabilities and threats my go unnoticed by the security team for a extended periods, significantly increasing the financial, legal, and reputational risk of the company.
We use products of leading vendors: Symantec
Data Base Protection
Databases have become one of the most critical assets for many companies, and protecting them is one of IT's highest priority jobs. Logging user activity in these databases, monitoring their vulnerabilities, and protecting against intrusion are paramount to ensuring your data, and your business, stay safe. We know the threats that are out there and how to protect against them. With Bell, you'll be confident in the safety of your data and the security of your business.
We use products of leading vendors: IBM Guardium