• Saudi Arabia, Al Riyadh
  • info@aflaksolutions.com
  • Office Hours: 8:00 AM – 6:00 PM

SOC IMPLEMENTATION (INCLUDING SIEM SOLUTION)

1. Real-time threat intelligence & event monitoring
2. Insider threat detection and cloud discovery
3. Data exfiltration and protection against phishing attacks
4. Endpoint detection & response (EDR)
5. Automated security investigation
6. incident forensics (Network scans to identify anomalous communications)
7. Detect abnormal connection behavior (volume/time/geographic)
8. Detect rogue services and systems, Malware/ Worm propagation, etc.
9. DNS Attack (detect outbound requests to malicious sites, identify DNS trends and certificates)

Read More

Data Encryption Services

1.DB Encryption
2.VMs Encryption
3.HSM
4.DSM
5.Key Management

Read More

Network Security

1. Endpoint Protection
2. Next Generation Firewall
3. Intrusion Detection/Prevention System
4. Network Access Control (NAC)
5. VPN (SSL, IPSEC, Concentrator)
6. Wireless Security
7. Database Monitoring, Auditing and Real-Time Protection

Read More

THREAT AND VULNERABILITY MANAGEMENT

1. Network Vulnerability Management
2. Operating System Vulnerability Management
3. Applications Vulnerability Management
4. Database Vulnerability Management
5. Identity Exposure
6. Desktop Vulnerability Management

Read More

IDENTITY AND ACCESS MANAGEMENT (IAM)

1. Single Sign On
2. Multifactor authentication
3. Unified Access Control
4. Identity Directory
5. User Administration & Provisioning
6. Workflow Management
7. Extended Role Based Access Control (E-RBAC) Workflow Management
8. Self-service Password Management (end-user)
9. Privileged user & Password management
10. Remote Vendor Monitoring (Session Recording)

Read More

Application Security Services

SECURE CODE REVIEW SERVICE A secure code review is a «white box» testing activity aimed at analyzing application source code and determining potential security weaknesses and flaws in the code. It includes a combination of scanning tools and manual review to identify security flaws in source code.

1.SAST
2.IAST/DAST
3.Software Risk Management
4.opensource Code review

Read More