IT security

Web Application Firewall (WAF)

WAF protects web applications and APIs against OWASP Top-10 threats, DDOS attacks and malicious bot attacks, among others. Advanced ML-based features improve security and reduce administrative overhead. Features include anomaly detection, API detection and protection, bot attack mitigation, and advanced threat analysis to identify the most critical threats across all protected applications.

Email filtering system (EmailGateway)

Full external protection. The email filtering system also protects against viruses, malware, phishing, spam and Dos attacks. It works with dynamic spam updates and defence networks to filter attacks as they occur. Full internal protection. The email filtering system helps protect against data loss via email. The system analyzes data to verify compliance with HIPAA, PCI, SOX, GLBA and other government regulations to prevent unauthorized access to personal numbers, credit card numbers, health insurance numbers, source codes, business plans, financial information, and more. When such events occur, the system can encrypt, quarantine or block the sending of suspicious mail and send an alert about the event in several ways.

Web filtering system (WebGateway)

Complete protection for inbound and outbound web traffic, providing security for all aspects of Web 2.0 traffic. In the case of user-initiated web requests, the web filtering system first enforces the organisation's Internet usage policy. For all authorised traffic, it uses local and global techniques to analyse the intent and nature of all content and active code entering the network via the requested website and provides immediate protection against malware and hidden threats. In addition to the basic packet inspection techniques, it can even examine SSL traffic to provide in-depth protection against malicious code that disguises itself through encryption. To secure outbound traffic, it monitors user-generated content across all major protocols - HTTP, HTTPS and FTP - and protects against the loss of confidential information and other dangerous data leaks while using social networks, blogs, wiki pages, online organisers or calendars. The web filtering system prevents unauthorised data from leaving your organisation from 'bot-infected' machines trying to call home or send sensitive data.

Intrusion Prevention System (IPS)

An intelligent security solution that detects and blocks sophisticated attacks in networks. IPS offers integrated, automated, and executable knowledge-driven security. It combines network and system security infrastructure for enterprise-level proactive defense.

Data Loss Prevention (DLP)

DLP prevents unauthorized access to institutional data. The solution is customizable for access, permitted activities, and evidence storage. We can classify our data since sensitive information cannot be defined without it. The goal is to supervise all data loss channels without modifying daily work sessions, knowing that our data can be copied, printed, cut, compressed, and encrypted by some of our colleagues. With ePO central management, events related to data movement can be tracked, incidents can be regulated, and compliance with legal requirements can be ensured.

Advanced Threat Defense (ATD)

ATD not only performs regular database-based checks but also conducts comprehensive examinations in a virtual environment. In a protected environment, running in real-time on high-performance target hardware, it determines whether transmitted (attached, downloaded, forwarded) files contain any harmful code for the system. It integrates closely with existing defense mechanisms: MailGateway, WebGateway, Intrusion Prevention System. The device notifies all connected defense devices (MailGateway, WebGateway, Intrusion Prevention System) of detected malware, allowing these devices to block harmful content immediately in real-time.

Security Information & Event Management (SIEM)

Provides a comprehensive overview of the current situation, the company's security status, and compliance on a central console. Real-time and historical data storage and searchability allow the detection and defense against complex attacks. SIEM comes with built-in tools supporting configuration, rule set management, integrating MailGateway, WebGateway, Intrusion Prevention System, and ATD systems. We can not only examine what event occurred but also see which other logs followed it, what user activity was involved, how it affected the endpoint, and from which application the log entry came. In a company, various systems can be monitored, including APC, Apache, Apple, Check Point, Cisco, Dell PowerConnect Switches, FortiNet, HP, Juniper, McAfee, Microsoft, NetFlow, NetIQ Sentinel, Novell, OpenVPN, Oracle, Postfix, PostgreSQL, SendMail, Squid, Symantec, VMware, and more.

Endpoint Protection Suite (EPS)

Installation of client-side protection in the network. These clients, integrated through central management, would signal attacks and infections not only at the border defense (MailGateway, WebGateway, Intrusion Prevention System, ATD systems) and security event management (SIEM) level but also on the client side. Real-time alerts could be received from the entire network.