We offer you
Threats from the internet are reality and can affect anyone. Cyber-crime has become a professional business. The EU has recognized the danger and has initiated additional protection for EU citizens with the General Data Protection Regulation (GDPR). Companies now find themselves confronted with the big task of complying with the new set of rules.
Our managed security services help you reach the required level of security and to maintain it in the future.
|FORTINET Gold Partner||2017|
Our security appliance analyzes traffic from your network to the Internet for a week. We will present and discuss the ensuing report with you, and help you identify steps to improve your cyber threat defense, where necessary.
Managed Security Services
Our ITSD.Gateway IT Security Services secure your main access against the internet and filter malicious software. At the same time, they enable secure access for your employees and external companies.
Next Generation Firewalling
- Application Control
- Advanced Threat Protection
- Web Content Filtering
Mail is the most commonly used gateway for cyber criminals. We redirect your e-mail traffic bidirectionally across our platforms, reliably cleaning all emails of SPAM, viruses, malware, blocking botnets and IP addresses that are known to be dangerous.
Our ITSD.Web Service protects your online business from being taken offline and your website from being defaced, meaning that false content is shown. We also protect your business from malicious software or sensitive information from ending up in the hands of criminals.
- Support with PCI DSS 6.6 Compliance Requirements
- Anti-Web Defacement
- Data Loss Prevention
- Application Load-Balancing
- SSL Offloading
- Data Compression
Unprotected end devices such as PCs, laptops, tablets, and smartphones are a serious risk for all IT managers. Our ITSD.Endpoint service also closes this large attack surface for possible attackers.
- Endpoint Visibility & Compliance
- Closes known vulnerabilities in applications and operation systems
- Automated behavior-based protection against unknown risks
Advanced Persistent Threats (APT) are time-controlled or result-oriented attacks on your IT infrastructure. After your network is entered, other computers are infected and targeted information is gathered. This all happens undercover so that the attack can stay active as long as possible and then can cause the maximum amount of damage to your company at the “right“ time.
Our ITSD.Sandbox service tests and analyzes previously unclearly categorized data in a secure environment. This way, potential threats are identified, characterized, communicated as quickly as possible and thus defused for you.
Distributed Denail of Service (DDoS) attacks interfere with applications by overloading their servers or connections and are detected and blocked, i.a. by the analysis and correlation of behavioral patterns. Nowadays motives for DDoS attacks are either financially or politically motivated.
- Country Code/IP-Adress Filter (Geo-Location Protection)
- Bogon (Bogus IP) Filter, Access Control Lists
- Packet Flood Reductio / Protocol Verification
- Stateful Packet Inspection, Out-of-State Filter
- Granular Layer 3, 4 Filter
- Application Layer Filter, Get and Resource Flood Filter
- Algorithmic Filter
- Heuristic Filter