Cyber Security

Do you know what’s happening within your network?

Vulnerability Management

Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies and classifies the security holds (vulnerabilities) in a computer, network or communications infrastructure.

Qualys

Data Access Governance

Access governance is best descried as “governing who has access to what within and organisation”. Differentiated from “access management”. “Governance” implies that the control of access is driven by policy as well as procedure.

Stealthbits

Penetration Testing

Pen testing is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in the operating systems, service and application flaws, improper configurations or risky end-user behaviour.

CEH9

Firewall Services

Network firewalls are a software appliance running on general purpose hardware or hardware-based firewall computer appliances that filter traffic between two or more networks. A firewall is the first line of defence against the outside world.

Fortinet Sonicwall

Encyrption

Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume thus preventing unauthorized access to data storage.

McAfee

Anti-Virus

Delivering proactive and proven security solutions and services that help secure systems and networks. Protect your network from the latest mal-ware and emerging online threats. Our solutions are designed to work together, integrating anti-malware, antispyware, and antivirus software with security management features that deliver unsurpassed real-time visibility and analytics, reduce risk, ensure compliance, improve Internet security, and help businesses achieve operational efficiencies.


Trend Micro McAfee