Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies and classifies the security holds (vulnerabilities) in a computer, network or communications infrastructure.
Access governance is best descried as “governing who has access to what within and organisation”. Differentiated from “access management”. “Governance” implies that the control of access is driven by policy as well as procedure.
Pen testing is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in the operating systems, service and application flaws, improper configurations or risky end-user behaviour.
Network firewalls are a software appliance running on general purpose hardware or hardware-based firewall computer appliances that filter traffic between two or more networks. A firewall is the first line of defence against the outside world.
Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume thus preventing unauthorized access to data storage.
Delivering proactive and proven security solutions and services that help secure systems and networks. Protect your network from the latest mal-ware and emerging online threats. Our solutions are designed to work together, integrating anti-malware, antispyware, and antivirus software with security management features that deliver unsurpassed real-time visibility and analytics, reduce risk, ensure compliance, improve Internet security, and help businesses achieve operational efficiencies.