Do you store important information in digital form? Do you need real-time scanning of messages and attachments received via email? Do you wish to secure your access channels from outside the organisation and the networks spread geographically from one single management console?
FortiGate – The Complete Firewall Solution
Ensures protection in all areas without impacting on the performance of critical applications or the reliability of the network.
Security solution with multiple features, flexible for all business segments.
Scalable with the diversity of the system: server mail; application servers; database servers; web portals.
Allows for secure VPN communication between geographically spread headquarters.
FortiGuard® services provide continuous, automatic updating of antivirus/antimalware, IPS, web filtering and antispam features, and protect applications from the new types of attacks.
FortiGate® equipment filters all data traffic at protocol and application level.
No special requirements at installation. Intuitive graphic configuration interfaces. Reduced time and effort with installing the equipment in remote locations
Simplified licensing per device, not per user. Easy and cheap to manage.
With no major impact on the IT topology existing in the organisation
Too much spam? Do you receive a significant amount of unsollicited email? Are recipients receiving email with delays? Is the email server frequently blocked on spam lists? Do you experience difficulties with employees’ activity and with the operation of the mail server?
FortiMail – The Antispam, Antivirus, Antimalware Solution
Adaptable for all business segments, from small to enterprise.
Quick installation and configuration (appliance solution). No special requirements for network installation.
Flexible operation with intuitive web-based interface, accessible from mobile devices.
Enterprise antispam and antivirus features.
Efficient storage system on RAID technology.
Automatic updates of antivirus signatures and of the detection engine, for non stop protection against spam, viruses, worms and trojans.
Email agent (MTA). Support for most email clients via traditional protocols.
Extended set of reporting tools.
Backup support for remote storage of archived emails and optimal long-term operation. Enables migration of messages of certain age on external, cheaper storage devices.
Network, in 3 possible ways:
Email server (manages the entire email flow of the company)
Gateway (receives email, then forwards it to the server)
Transparent (implemented in front of an existing email server, only scans the traffic with no redirecting).
With other solutions:
With Active Directory solutions for users and groups of users
With VMware virtualisation solutions for virtual FortiMail appliances.
With equipment of the FortiGate or FortiGuard family to offer a multi-layer antivirus, antispam solution for enterprises with several FortiMail devices in place.
With mail clients from mobile devices, for cases where mobility is a fundamental requirement.
Do you look to achieve more independence from your suppliers? Do you wish to ensure security of the organisation in full confidentiality, identification of human error and of users that can pose the greatest risks?
ObserveIT – User Monitoring Solution
Monitors suppliers remotely, checks completion of their obligations and establishes their risk level.
Monitors, records and audits user actions. Generates a prioritised list of users that pose the highest risk to the organisation. Enables keyword searching through records.
Enables instant access to video records and real-time viewing of activity flows.
Real-time signalling of negative action and human error. Customized warnings integrated with the SIEM/NMS systems. Identifies the reason why the error occurred and collects irrefutable evidence.
Checks conformity for PCI, HIPAA, SOX and ISO 270001.
Native support for multi-tenant use with information sharing within a safe environment.
Simplified infrastructure, one console. Consolidates data from multiple monitoring systems.
Highly scalable. Enables the same features according to the licensing.
Low overall ownership cost, professional implementation services.
Multi-level enterprise solution with secure multi-organisation access.
Implementation relying on agents that can be installed on various platforms.
Runs on Windows and Linux, local or remote sessions – Vmware, ICA, SSH, Telnet, VNC RDP
Records and plays any Windows and Unix session, including mouse movements, interaction with graphic interfaces, text entries and command line
Monitor operating systems, identify unauthorised intrusions, and reduce troubleshooting time with a solution recognised internationally for its easy implementation, complex gathering abilities and quick accessing of information on security incidents.
SolarWinds Log & Event Manager
Robust solution, compliant to international standards.
Enables centralised collection and management of security information from multiple sources in the organisation.
Monitors and issues warnings for any suspicious or malintended activity on a registry, folder or file.
Enables quick, automatic action against threat through the Powerful Active Response technology.
Prevents data loss and leaks of information through USB devices.
Reduces intervention time by efficient identification and correlation of specific rules, reports and quick-implementation response (~ 1h). Enables high data compression.
Enables advanced search in the log database. Enables scheduling of searches and receiving answers automatically via email.
Provides support for creating customised email templates and generating reports.
Web interface with quick access to basic information regarding the status of services and of the IT infrastructure.
The SolarWinds Log & Event Manager solution enables process monitoring and control through reports according to PCI DSS, GLBA, SOX, NERC CIP, HIPAA standards etc.
Do you look to prevent illicit access to accounts and potential internal actions carried out by employed staff that has access to sensitive information? Do you need to check all transactions against money laundry methods? Do you face attacks on your card operations?
Intellinx Anti-Fraud and Anti-Money Laundering Solution
Reliable, robust solution, consolidated for the financial field, checking conformity, and operational risks.
Monitors online and offline activity in applications and data regarding use of these systems to detect suspicious transactions and create a full user profile.
Issues real-time warnings on potential fraudulent behaviour and new fraud scenarios.
Stops identity theft, account takeover, man-in-the-browser and DDOS attacks.
Triggers actions such as requesting additional credentials; moving a transaction offline or postponing the transaction, thus discouraging fraudulent activities and data theft.
Automatically records online staff activity and the flow of business between platforms, with visual review of user screens, keyboard entries and advanced search.
Maintains complete visibility upon a user’s activity on all platforms without involving the IT department.
Do you want to stop or prevent loss of important data? To you look for quick encryption, storage and transparent sharing of mail, data and information stored locally, without affecting user experience? Do you need a confident solution for deleting confidential information?
Symantec Encryption Family – Encryption Solutions
Protects data stored localy on desktops, laptops, terminals, mobile storage devices or cloud storage, including for boot sectors or system and swap files.
Secures information depending on the manner of handling, storage location, destination. Adaptable for terminals, email, instant messages, files, various and multiple encryption requests.
Uses PGP Self-Decrypting Archive, PGP Virtual Disk and PGP Zip for transparent encryption and sharing of data and creation of encrypted containers that are independent from the storage medium for data transport and sharing. Encrypts mail on desktop, gateway, mobile devices.
Centralises creation, implementation and management of security policies. Advanced reporting features.
Ensures compliance with security standards of data taken over from PGP Technology and implementation of good practice recommendations, by using last-generation algorithms.
Symantec Encryption Management for centralised component deployment and management.
Encryption Desktop Professional – Drive and Desktop Email encryption features.
Encryption Desktop Storage – with encryption features for Drive and File Share,
Central point: the management server.
Licenses purchased separately for the required features:
Symantec Desktop Email – encryption, signing, decryption and checking of email messages, automatic and transparent.
PGP Viewer – decrypting, checking and displaying email messages outside the frequently used platform.
Symantec File Share Encryption – safe sharing of encrypted files.
Symantec Drive Encryption – encrypting of an entire drive (including boot information, swap files); full anti-theft protection.
PGP Virtual Disk Volumes – encrypted virtual disk (component of the local HDD).
PGP Zip – add any combination of files to encrypted archives.
PGP Shredder – full, certain destruction of files and folders, with no possibility of specialised recovery.
Key Management – management of keys (symmetrical, public or private).