Solutions
Innovative cyber security solutions
Cyber Security & Protection
Palo Alto Cortex XDR – a comprehensive cyber threat protection, detection and response platform
Trellix Complete Endpoint Business –
Detecție, Protecție și Investigație atac cibernetic
NGFW, Web Application Firewall
Palo Alto NGFW – Next Generation Firewall, ATP, URL Filtering, SD-WAN; VPN, Sandboxing
Forcepoint NGFW – Next Generation Firewall, ATP, URL Filtering, SD-WAN; VPN, Sandboxing, ZTNA – Zero Trust Network Access
CISCO Firepower NGFW – Next Generation Firewall, ISE (Identity Services Engine), Umbrella
Data Security & Auditing & SIEM
Splunk SIEM – collects, normalizes and analyzes security data from various sources and applications
Data Protection & Classification, DRM, IRM
Forcepoint Data Security – DLP, Discovery & Classification, Encryption, User and Entity Behavior Analytics, Insider Threat Protection
Back-up, Archiving, Restore, Disaster Recovery
Dell Data Protection Suite – Back-up, Archiving, Restore, Disaster Recovery, NetWorker, Avamar, Data Domain
Vulnerability Managment
Qualys Vulnerability Management / QualysGuard – identify, track and remediate vulnerabilities in IT infrastructure
MFA, PAM, Identity & Access Management
Thales Authentication – strong cryptographic techniques and MFA – Multi-Factor authentication
Mobile Device Management, Mobile Protection
Network Security Policy, Monitoring, Inventory
Riverbed APM – Application Performance Management & NPM Network Performance Management
Axence: Integrated IT management, asset network software, help desk, smartime, user management
Dynatrace – Unified Observability and Security Automated, Scalable, Secure — Drive business transformation with contextual analytics, AI, and automation
Netscout – Network Performance & Security — Improve and Secure Service, Network, and Application Performance Anywhere and Everywher
Encryption & HSM
Thales Security Modules (HSMs), nShield hardware security modules & payShield payment HSMs
Certes Network – Zero Trust Infrastructure with security management & protection for Layer 2, Layer 3 si Layer 4 networks. Quantum encryption Layer 4
Perimeter 81 SASE – Secure Access Service Edge, Global Backbone Network, Private Access
Application Delivery Management
Opentext – Fortify on Demand – security app vulnerability management (static & dynamic)
Dynatrace ADM – Application Delivery Management, Application Security, Application Vulnerability Analytics
DDoS Protection
Arbor Adaptive DDoS Defense Platform, Cyber Threat and Adaptive DDoS Mitigation, Network Visibility, backed by industry-leading threat intelligence
SOC, Security Assessment, Penetration Testings
Palo Alto XPANSE – active attack surface management solution – discover, learn about and respond to unknown risks in all connected systems and exposed services
Palo Alto Unite 42 it is a global threat intelligence team and research organization. It specializes in identifying, analyzing, and combating emerging cyber threats, including advanced persistent threats (APTs), malware campaigns, and cyber attacks targeting organizations worldwide.
Fortra PhishLabs – Digital Risk Protection – protects your organization’s critical digital assets and data from online threats including brand abuse, account takeover, social media scams, data leakage, and advanced email attacks
IT solutions and systems
PCs, Laptops, Ruggedized equipment
Storage
HPe StoreVirtual, 3PAR StoreServ, MSA (Modular Storage Array), StoreEasy, StoreOnce, Storage
Routing, Switching, Wi-Fi Systems
Catalyst Series Switches, Nexus Series Switches, ISR (Integrated Services Router), Catalyst 9000 Series Switches, Catalyst 8000 Series Edge Platforms
ExtremeRouting SLX Series & VSP Series, ExtremeSwitching X465 Series & X870 Series, Extreme Fabric Automation, WiNG AP 7600 Series, AP 7632, AP 560 Series
Mikrotik RouterBOARD, Router Switch CRS, CSS, RB, RBD, MikroTik cAP ac, hAP ac lite, mAP Lite, BaseBox, SXT, LHG, wAP ac
Cyber Range platform
Keysight – Cyber Resilience with Simulated Attacks, Fight Cyberattacks in a Real-Life Setting, Gain Confidence Knowing You’re Ready for Attackers, tailored Training to Fit Your Team’s and Network Needs
Cyberbit Cyber Range Attack Simulation, Live Fire Attacks, in the Cloud, Training with the Tools You Use Daily, Cyber Lab, Cyber Crisis Simulator
Cyber & Air Defence
Dat Con Mobile Surveillance Systems, Electro Optical Heads – Multi Sensors, Portable Observation Systems – Bopas, Early Fire Detection Systems, Anti Drone Systems – LYNX,
Dat Con Defence – Anti Drone LYNX, Commander Sight Lotus, Weapon Station Sights – EOS
Body Worn Camera & Face Recognition
Video Analytics, NVR, AVL
Milestone XProtect VMS (Video Management Software), XProtect Smart Client, XProtect Mobile, XProtect Add-ons
Telephony / DECT
Gigaset DECT (Digital Enhanced Cordless Telecommunications), N870 IP PR, N510 IP PRO, DX800A, DX600A ISDN, DE900 IP PRO
Other IT platforms and solutions
Microsoft Windows, Office Suite, Microsoft 365, Azure, Windows Server, Exchange, SQL, Sharepoint
TeamViewer Remote Access, TeamViewer Meetings, eamViewer Remote Management, TeamViewer IoT
Training courses, Training - IT
Cyber Security, IT, Business, Leadership, Lean & Agile, Management, Vânzări, Marketing