Kiberbiztonság

Cybersecurity

The ever-expanding technologies provide cybercriminals with a large space to operate. When defending against attacks, it is important to use the latest systems and solutions. As there is no such thing as an unbreakable system, prevention and risk reduction are key.

We use the following technologies in our work:

PfSense

Next Generation Firewall

Fortigate

Next Generation Firewall

Cisco

Network solutions

Zabbix

Monitoring

FIREWALL SETTINGS, MONITORING, PROXY

Protecting your data is paramount, so preventing attacks and data leaks is a key element of cyber security. This is where firewall and monitoring systems provide adequate protection.


ENDPOINT PROTECTION

Protection against harmful codecs is also essential. Endpoint protection systems are designed to block virus attacks and the spread of viruses in the system. Proper virus protection can also prevent the execution of code from unauthenticated sources.

We use the following technologies in our work:

McAfee

EDR/XDR

Eset

EDX/XDR

Symantec

EDR/XDR

We use the following technologies in our work:

IBM QRadar

SIEM

Splunk

Big Data platform

Graylog

SIEM

McAfee ESM

SIEM

ELK stack

Cetrilized Logging System

SIEM systems

Log file analysis provides a complete picture of what is happening on the network and on the systems in the network. With a properly configured SIEM system, all types of attacks can be prevented and detected, whether internal or external. It also provides the possibility to analyse user behaviour.


VULNERABILITY MANAGEMENT, HARDENING

Exploiting vulnerabilities is the primary target of attackers. Vulnerability scanning systems can be used to pinpoint exactly which current versions or configurations of servers and systems on the network have vulnerable elements. And hardening provides adequate protection against vulnerabilities that arise from configurations.

We use the following technologies in our work:

Rapid7

Vulnerability management and Compliance

Qualys

Vulnerability management and Compliance

Nessus

Vulnerability Management

SynerinSoft
Cookie Policy

In order to enhance the user experience related to the website, we use cookies on our website in accordance with the provisions of the privacy policy.