Solutions

dlp

DLP, Data loss or Data leak prevention is the technology preventing unauthorized intentional or unintentional loss or leak of company data. Currently the news media are full of cases reporting loss of confidential data (credit card numbers, user names and passwords) from different organizations.

DLP has to address:

  • Physical security – mandatory and important to limit access for unauthorized persons
  • Back up of data / for the purpose of data recovery in case of hw failure, natural disasters, etc.
  • Securing IT infrastructure – at all network levels
According to statistic data piled over few last tears, the most common reason for DLP event is unintentional sending an email to wrong address.
SecTec offers technology solution for securing complete infrastructure:

a) Gateway

  • Control of all protocol outbound and inbound traffic from internal network to Internet
  • Content control for traffic from internal network to Internet
  • Iption for blocking the traffic, and logging

b) Network

  • Control of network printers

c) Endpoint

  • Disk encryption
  • Control of access to ports
  • Firewall , VPN
  • Application access control
  • Data access control

More solutions

sast

CxSAST is a powerful Static Source Code Analysis solution designed for identifying, tracking and fixing technical and logical security flaws from the root: the source code.

Read more

byod

BYOD (Bring Your Own Device) is more and more common situation, in which you use your own device (smartphones, laptops, tablets, etc.) even for the company purpose. BYOD is quite a controversial topic and the opinions are often very polarized.

Read more

web-security

Coming of Web 2.0 interface since y2004  gradually replacing the static Web 1.0 and changed the fixed content of the website and replaces it with a dynamic space-sharing and joint creation of content.

Read more

mobile-security

Mobile security represents growing security area, its growth caused primarily by the growth in sales of mobile devices (smartphones, tablets, notebooks) and existence of BYOD.

Read more