1. Next Generation Firewall, NGFW
Purpose: Corporate firewall
- “classic” functions (NAT / ACL / IPS / QoS / VPN, etc.)
- in-depth control and filtering of packets (up to the level of Deep Packet Inspection)
- identification of applications and granular configuration of network policies for them
- URL filtering and malware detection based on reputation databases
- inspection of SSL traffic
2. Endpoint Protection, EPP
Purpose: Basic mandatory (initial) component of any cyber security system:
- signature antivirus with a centralized management console
- Device Control – control of removable media
- Application Control – blocking the launch of programs on the “black” list
- Host IDS/IPS is an extension of functionality built into the OS
3. Multifactor Authentication, MFA
Purpose: Comprehensive anti-fraud and enhanced authentication system:
- universal authentication server with the possibility of integration with any environment (without restrictions)
- the world’s broadest set of factors affecting mobile identification (geolocation, root/jalibraek, physical device identifiers, etc.) and enabling authentication (any biometric sensors, background behavioral gyro tracking, touch screen tap patterns, etc.)
- technology for protecting third-party mobile (for example, banking) applications without the need for integration into the applications themselves, by creating an external “layer” of control and ensuring application security
- background behavioral analysis of user sessions and prevention of fraudulent transactions
- deep permanent analytics to reduce the risks of fraud and improve the quality of user service (for example, bank customers)
4. Asset & Patch Management
Purpose: A comprehensive toolkit for building a basic centralized IT infrastructure monitoring system:
- Asset Management (identification of network assets, maintaining a single database of information resources)
- Patch Management (management of OS and software updates)
- Network Monitoring (monitoring the functionality of devices, ports, monitoring the serviceability and availability of channels, etc.)
- Server Monitoring (control of the “health” of servers, applications, databases, hypervisors, etc.)
5. Backup & Restore
Purpose: Automated centralized IMS for any virtualization environments, SZD, DB, applications, clouds:
- creating, testing and restoring data backups in different modes (Full backup, Incremental backup, Differential backup)
- support for various architectures and storage environments (P2P / P2V / D2D / D2D2T)
- the ability to create database backups without stopping them
- deduplication, encryption, geographically remote storage
- compliance with established RTO / RPO indicators