Solutions Implementation

RSec

Design, implement and support cybersecurity solutions aimed at protecting data, users, technology infrastructure and technology assets from malicious attacks – helping organizations to realize stronger, simpler and more cost-effective cybersecurity programs that support their digital transformation strategy.

NETWORK SECURITY

  • Secure Web Gateway (SWG)
  • Secure Remote Access
  • NGFW (Next Generation Firewall)
  • NAC (Network Access Control)
  • SDP (Software Defined Perimeter)
  • NG-IPS / NG-IDS (Next Generation Intrusion Detection and Prevention System)
  • Anti-DDoS
 

ENDPOINT SECURITY

  • EDR (Endpoint Detection and Response)
  • MDM (Mobile Device Management)
  • Sandbox / Antimalware Antimalware for mobile devices.
  • Hard Disk Encryption
  • Comprehensive EndPoint
  • Management (Patch Management, Software Inventory and Compliance Management)

DATA SECURITY

  • Database Firewall
  • Data Loss Prevention (DLP)
  • Secure Deletion and information Certification
  • File Integrity Monitoring (FIM)
  • File Security (Box, Dropbox, OneDrive, Sharepoint)
  • Data Tokenization
  • Data Masking
  • Data encryption
  • Automatic document classification and tagging

APPLICATION SECURITY

  • Shielding (RASP, Obfuscation) of mobile, web applications and APIs
  • Web Application Firewall (WAF)
  • Container and Kubernetes Security
  • Real-time threat intelligence for mobile, web and APIs
  • Application security testing (SAST, DAST, IAST, SCA)
  • Cryptographic key protection in applications

 

EMAIL SECURITY

  • Security for Microsoft 365 (M365)
  • Domain spoofing protection
  • (DMARC Automated)
  • Next Generation Phishing Protection (BEC)
  • Secure Email Gateway / AntiSpam (SEG)
  • Email Encryption

 

OT / IOT SECURITY

  • Improve your asset control by conducting a detailed asset inventory and near-real time  vulnerability analysis .
  • Minimize risks by implementing Industrial Cybersecurity – ICS (Industrial control systems), implement powerful  tools to detect events in a timely manner and with the ability to remotely isolate the compromised operation.
  • Maximize your operational control, detecting ONLINE and in near-real time out-of-range operating variables and alert situations that your operator does not detect.

 

INTELLIGENT SECURITY

  • SIEM
  • SOAR
  • Breach and Attack Simulation

 

CLOUD SECURITY

  • Cloud Security Posture Management (CSPM)
  • Cloud Access Security Broker (CASB)
  • Cloud Workload Protection Platform (CWPP)
  • Key Management/Administration for Multi-Cloud Environments

WE WORK WITH THE LEADER BRANDS IN THE
TECHNOLOGY MARKET