SOC IMPLEMENTATION (INCLUDING SIEM SOLUTION)
1. Real-time threat intelligence & event monitoring
2. Insider threat detection and cloud discovery
3. Data exfiltration and protection against phishing attacks
4. Endpoint detection & response (EDR)
5. Automated security investigation
6. incident forensics (Network scans to identify anomalous communications)
7. Detect abnormal connection behavior (volume/time/geographic)
8. Detect rogue services and systems, Malware/ Worm propagation, etc.
9. DNS Attack (detect outbound requests to malicious sites, identify DNS trends and certificates)
Read More
2. Insider threat detection and cloud discovery
3. Data exfiltration and protection against phishing attacks
4. Endpoint detection & response (EDR)
5. Automated security investigation
6. incident forensics (Network scans to identify anomalous communications)
7. Detect abnormal connection behavior (volume/time/geographic)
8. Detect rogue services and systems, Malware/ Worm propagation, etc.
9. DNS Attack (detect outbound requests to malicious sites, identify DNS trends and certificates)
Network Security
1. Endpoint Protection
2. Next Generation Firewall
3. Intrusion Detection/Prevention System
4. Network Access Control (NAC)
5. VPN (SSL, IPSEC, Concentrator)
6. Wireless Security
7. Database Monitoring, Auditing and Real-Time Protection
Read More
2. Next Generation Firewall
3. Intrusion Detection/Prevention System
4. Network Access Control (NAC)
5. VPN (SSL, IPSEC, Concentrator)
6. Wireless Security
7. Database Monitoring, Auditing and Real-Time Protection
THREAT AND VULNERABILITY MANAGEMENT
1. Network Vulnerability Management
2. Operating System Vulnerability Management
3. Applications Vulnerability Management
4. Database Vulnerability Management
5. Identity Exposure 6. Desktop Vulnerability Management
Read More
2. Operating System Vulnerability Management
3. Applications Vulnerability Management
4. Database Vulnerability Management
5. Identity Exposure 6. Desktop Vulnerability Management
IDENTITY AND ACCESS MANAGEMENT (IAM)
1. Single Sign On
2. Multifactor authentication
3. Unified Access Control
4. Identity Directory
5. User Administration & Provisioning
6. Workflow Management
7. Extended Role Based Access Control (E-RBAC) Workflow Management
8. Self-service Password Management (end-user)
9. Privileged user & Password management
10. Remote Vendor Monitoring (Session Recording)
Read More
2. Multifactor authentication
3. Unified Access Control
4. Identity Directory
5. User Administration & Provisioning
6. Workflow Management
7. Extended Role Based Access Control (E-RBAC) Workflow Management
8. Self-service Password Management (end-user)
9. Privileged user & Password management
10. Remote Vendor Monitoring (Session Recording)
Application Security Services
SECURE CODE REVIEW SERVICE A secure code review is a «white box» testing activity aimed at analyzing application source code and determining potential security weaknesses and flaws in the code. It includes a combination of scanning tools and manual review to identify security flaws in source code.
1.SAST
2.IAST/DAST
3.Software Risk Management
4.opensource Code review
Read More
3.Software Risk Management
4.opensource Code review