business solutions
IT risk management

PROTECTION AGAINST THREATS / MALWARE SOFTWARE

Systems for detecting and removing advanced, targeted threats.

 

Solutions allowing protection of organisation system from malware, crimeware and ransomware threats. Using a number of mechanisms that allow threat detection based on known and unknown file patterns or behaviours.

 

Great flexibility and ease of integration with existing solutions, allows quick and effective implementation of threat protection mechanisms, saving time needed to restore full functionality of the systems if the threat is found to have interfered.

 

Opportunity to view, inspect and analyze encrypted traffic.

 

It is estimated that in organisations about 50-75% of all traffic is encrypted. This means that security systems can’t analyse over half of the data transmission in the company, they are “blind” to potential threats sent via encrypted channels. It is worth realising that the analysis of attacks on various organisations over the last few months indicates that about 80% of them used encrypted communication to communicate with the management center (Command & Control).

 

In addition, analysts estimates indicate that the amount of encrypted traffic within the organisations will grow by about 20% per year.

 

The use of devices enabling deciphering of traffic maximise the protective capabilities of security systems already used in the organisation (eg IPS, DLP, NBAD, APM). This in turn gives the possibility of having a full preview into the communication for specialized analytical tools. This makes it  possible to conduct a reliable analysis, detecting threats before they significantly affect the organisation.

 

Improve the level of security and accessibility by testing network communication.

 

Two aspects are considered for analyzing network traffic. We consider the first one in terms of performance In this respect, it is important to determine the functioning of the local network, such as communication, application performance, and Internet access. It is possible to research services in specific segments, for specific applications, or even the analysis of their bandwidth. In the second case, monitoring concerns security. Security in the meaning of recording and analyzing network traffic in terms of the occurrence of malicious software, history of its spread (reconstruction of the infection path) and profile of non-standard traffic (behavioral analysis, statistical analysis). This tools support other systems (SIEM, DLP, IPS), providing the context of a given security incident.

 

Automatic reconfiguration of network device policies, checking the current status of security, network and applications.

 

A comprehensive solution that automates network changes and maintains compliance with policies and industry standards. By using advanced analytical and automation technologies, it is possible to manage processes, introduce changes in the network and application layers.

 

Control mechanisms make it possible to define and enforce security policies such as granting access to a given service and conducting periodic certification campaigns allowing for a cyclical process of verification of access status.

 

The orchestration is possible thanks to the collected data at the network and application levels, building dependencies and links between the infrastructure and the target application (eg a web application located on several servers uses databases located in several DCs) and making sure that the communication between them is continuous, while maintaining its availability.

 

This mechanisms allow you to save time and budget for administrative tasks, at the same time increasing the level of security and control in the organization

Password management

Automatization of password change process. Password compliance with password politics

 

The IAM solution enables global management of organisation password politics, allow changes and password resets for business users, generating passwords for new accounts, and defining policies  in compliance with the  organisation’s requirements.

 

The central portal provides a unified and intuitive interface that allows business users to change or reset passwords in organisational/organised systems, at the same time providing passwords in  compliance with defined policies.

 

Requests for password resets or password changes, force the use of  strong passwords raises the level of security simultaneously, reducing the  workload for the Technical Support Service.

Ensuring and controlling compliance with regulations. Certification of owned access, ensuring compliance with security policies

Automatic reconfiguration of network device policies, checking the current status of security, network and applications.

 

A comprehensive solution that automates network changes and maintains compliance with policies and industry standards. By using advanced analytical and automation technologies, it is possible to manage processes, introduce changes in the network and application layers.

 

Control mechanisms make it possible to define and enforce security policies such as granting access to a given service and conducting periodic certification campaigns allowing for a cyclical process of verification of access status.

 

 

The orchestration is possible thanks to the collected data at the network and application levels, building dependencies and links between the infrastructure and the target application (eg a web application located on several servers uses databases located in several DCs) and making sure that the communication between them is continuous, while maintaining its availability.

 

This mechanisms allow you to save time and budget for administrative tasks, at the same time increasing the level of security and control in the organization.

Contact

Our Office

Company’s Registration Address:

 

Concept Data Sp. z o.o. Sp.k.

ul. Piękna 24/26A,
00-549 Warszawa

 

office: +48 22 833 86 35

fax: +48 22 832 17 19

NIP: 701-055-33-94

KRS: 0000603567

Office Address:

 

North Gate Building
ul. Bonifraterska 17,

piętro 4

00-203 Warszawa

 

office: +48 22 833 86 35

fax: +48 22 832 17 19

 

Access to North Gate office
Access to Piękna office

North Gate Building

 

ul. Bonifraterska 17,

00-203 Warszawa

4th floor.

 

Piękna office

 

ul. Piękna 24/26A,
00-549 Warszawa