Solutions

mobile-security

Mobile security represents growing security area, its growth caused primarily by the growth in sales of mobile devices (smartphones, tablets, notebooks) and existence of BYOD. Attacker primarily focus on the fastest growing market. Is is necessary to acknowledge, that these devices by their computing power and parameters not only level with standard office computers, but in many cases even beat them. Fir this very reason it must be noted, that the security measures applied to traditional devices in reference to technologies, ways of deployment and structure have to be applied to mobile devices as well. The high diversity of OS and models of devices make this task even tougher.

All mobile devices have in common:

  • Commonly connect between company network and public network and in most cases bypass central gateway and its security policies
  • Contain company data and access information to company network
  • Vendors limit access of third party to certain applications and functions

Mobile Security can be divided in two separate areas:

  • Mobile device management (MDM)
  • Mobile device security (MDS)

These areas quite often overlap and complement each other using the option provided already by the device vendor.
 
Mobile device management (MDM)
This area most commonly includes:

  • Devices inventory
  • Automated distribution and management of policies
  • Application management
  • Reporting
  • Remote Lock, Remote Wipe, Device Track, Encryption

Mobile device security (MDS)
This area most commonly includes:

  • Antimalware protection
  • Malicious web site protection
  • Firewall and attack detection
  • Application security evaluation
  • DLP
Would you use PC without firewall and antimalware protection? If the answer is NO, then we have a solution for You:

More solutions

web-application-firewall

Web Application Firewall protects Web sites and Web applications from attackers who exploit vulnerabilities applications or protocols to steal data or to change the appearance of the organization's website.

Read more

load-balancing

Load balancing (load balancing) is in network solutions technology, which distributes the load between two or more computers, network connections, processors, hard disks or other resources in order to achieve optimal resource utilization, maximize throughput, minimize response time and avoiding congestion.

Read more

incapsula

  Read more

servers

Solution Cluster-in-a-Box is a pre-configured and pre-installed IT environment with high availability for small and medium sized businesses in a single cabinet.

Read more