Information Security Solutions
- SIEM Solutions
- Virtual Private Network
- Email Security
- Data Protection
- Network Security
- System Security
- Penetration Testing
- Vulnerability Assessment
- ISMS Policy Templates
- ISO 27001 Consultancy
- BCP & DR Consultancy
- IT Audit consultancy
_________________________
Single Sign On - SSO
Single Sign On (SSO) is a mechanism that allows a user to be authenticated
only once on a system.
Advantages:
- Once authenticated, user can roam the network freely and access resources and services without being re challenged for authentication.
- Easier administration by reducing the number of locations on which an account must be defined
- Enabled through authentication systems that provide logon credentials automatically when prompted.
SSO Methods:
- Scripts
- Kerberos
- SESAME
- KryptoKnight
_________________________
iSquare Information Security Solutions
E-Mail Security
Email is one of the most widely and commonly used Internet services Methods to improve Email Security
- Restricting access to messages to their intended recipients
- Maintaining the integrity of messages
- Authenticate and verify the source of messages
- Verify the delivery of messages
- Classify sensitive content within or attached to messages
- Provide for non repudiation
Mailmarshal
- Enforces security policies and leverages content monitoring and filtering technology to meet regulatory compliance standards and protect against data leakage; provides enhanced Public Key Infrastructure with advanced functionality.
Email Security Products
- M86 MailMarshal SMTP
- M86 MailMarshal Exchange
- M86 MailMarshal Service Provider Edition
- M86 MailMarshal Secure Email Server
Web Security Products
- M86 Secure Web Gateway
- M86 Web Filtering and Reporting Suite
- M86 WebMarshal
Business Continuity Plan (BCP)
BCP is a system or methodology used to create a plan on how an organization will resume its partially or completely interrupted critical functions within a predetermined time after the occurrence of a disaster or disruption. The aim is to keep critical functions operational.
Business Impact Analysis:
BIA goal is to distinguish which are the most crucial and require to continue operations if a disaster occurs
Recovery point objective (RPO)—The RPO defines how current the data must be or how much data an organization can afford to lose. The greater the RPO, the more tolerant the process is to interruption.
Recovery time objective (RTO)—The RTO specifies the maximum elapsed time to
recover an application at an alternate site. The greater the RTO, the longer the
process can take to be restored
_________________________________________________________________________