Installation or evaluation of alert management tools such as a log collector or SIEM (Security Information Event Management). Proposed indicators of safety measures usable with dashboards.
Conduct a risk analysis, controls and countermeasures in the network and the company’s systems. Revision and updating of security policies.
Incorporation of new applications or security functions such as firewall, IPS, Internet filtering and encryption. We advise you in all stages; Validation and definition of architecture, choice of suppliers, installation and configuration, user guides and operator training.
Digital survey of an event through the following stages: data collection, analysis and presentation of results. Internal harassment, fraud, theft of data, but also external threats (infection and fraudulent access).
Securing your network perimeter and a good segregation of assets is essential. Risk levels and control requirements vary by area; WAN, DMZ, Intranet and VLAN. The continuity of your business depends entirely on the availability of the network.
Evaluate and secure core devices such as domain controllers, Active Directory, and file servers. We also manage updates, backups and centralized monitoring of alerts.
Evaluation of the level of security across the various tasks of network operation and systems of the company. Definition of a confidence index in the face of a computer disaster (procedure for managing backup incidents, revision of mechanisms for updating software vulnerabilities)
Sensitize employees to safety in the company. Learn to detect them and guard against threats: fraud, hacking, phishing, information theft, malicious infection.