
Solutions Implementation

RSec
Design, implement and support cybersecurity solutions aimed at protecting data, users, technology infrastructure and technology assets from malicious attacks – helping organizations to realize stronger, simpler and more cost-effective cybersecurity programs that support their digital transformation strategy.


NETWORK SECURITY

- Secure Web Gateway (SWG)
- Secure Remote Access
- NGFW (Next Generation Firewall)
- NAC (Network Access Control)
- SDP (Software Defined Perimeter)
- NG-IPS / NG-IDS (Next Generation Intrusion Detection and Prevention System)
- Anti-DDoS
ENDPOINT SECURITY

- EDR (Endpoint Detection and Response)
- MDM (Mobile Device Management)
- Sandbox / Antimalware Antimalware for mobile devices.
- Hard Disk Encryption
- Comprehensive EndPoint
- Management (Patch Management, Software Inventory and Compliance Management)
DATA SECURITY

- Database Firewall
- Data Loss Prevention (DLP)
- Secure Deletion and information Certification
- File Integrity Monitoring (FIM)
- File Security (Box, Dropbox, OneDrive, Sharepoint)
- Data Tokenization
- Data Masking
- Data encryption
- Automatic document classification and tagging
APPLICATION SECURITY

- Shielding (RASP, Obfuscation) of mobile, web applications and APIs
- Web Application Firewall (WAF)
- Container and Kubernetes Security
- Real-time threat intelligence for mobile, web and APIs
- Application security testing (SAST, DAST, IAST, SCA)
- Cryptographic key protection in applications
EMAIL SECURITY
- Security for Microsoft 365 (M365)
- Domain spoofing protection
- (DMARC Automated)
- Next Generation Phishing Protection (BEC)
- Secure Email Gateway / AntiSpam (SEG)
- Email Encryption
OT / IOT SECURITY
- Improve your asset control by conducting a detailed asset inventory and near-real time vulnerability analysis .
- Minimize risks by implementing Industrial Cybersecurity – ICS (Industrial control systems), implement powerful tools to detect events in a timely manner and with the ability to remotely isolate the compromised operation.
- Maximize your operational control, detecting ONLINE and in near-real time out-of-range operating variables and alert situations that your operator does not detect.
INTELLIGENT SECURITY
- SIEM
- SOAR
- Breach and Attack Simulation
CLOUD SECURITY
- Cloud Security Posture Management (CSPM)
- Cloud Access Security Broker (CASB)
- Cloud Workload Protection Platform (CWPP)
- Key Management/Administration for Multi-Cloud Environments
WE WORK WITH THE LEADER BRANDS IN THE
TECHNOLOGY MARKET


















