Solutions that customers like
- Security assessment on the mobile infrastructures in the organization.
- Integration of the MDM solutions On-premises or cloud-based.
Defending endpoints that are attached to the organizational network (DLP, device blocking, preventing unlicensed codes, etc.)
- Performing security and pen tests for Web, Smart Client and Mobile applications.
- Training and guidance for development groups within security development in PHP/NET/C++/C/JAVA.
Establishing solutions for control and defense of virtual infrastructures, e.g. DPI (deep packet inspection) abilities of the communications traffic between virtual servers.
Characterization and building of secure architecture for exposing services between organizational applications for business partners and customers.
Construction of a defense casing for the organization’s database, while realizing distribution mechanisms and data scrambling to maintain information.
Security intelligence (audit and monitoring)
Characterization and building of SIEM systems and SOC centers, in accordance with the organization’s security policy and regulatory demands.
- Performing security tests on cloud services for customers.
- Characterization of security solutions for organizations based on cloud services.
Construction of encryption casing of sensitive information according to its storage in the organization, such as encryption of hard disks, of detachable media, emails and information stored in Sharepoint.
- Building organizational methodologies for response on information and cyber events, recovery from events and containment.
- Performing an in-depth technological investigation of the information and cyber events for restoration of attack activity and identification of attack targets and understanding of the severity of the event.
Cyber 4 share point
A system for the management of a classified information security process, by removing digital media from classified internal networks into an external network, which has a lower classification than the network that keeps the information.
The Gigamon technology supplies organizations with improved access and visibility for the organizational monitoring and information security systems, both traditional and cloud-based.
Many organizations deal with the high costs of monitoring and access management for their database, but the smart branding solutions by Gigamon allows them to simplify and decrease risks, costs and TCO, while providing the organizations with the ability to improve their monitoring levels by maximizing the existing communications infrastructure, maintaining the level of information security and high functionality.
Gigamon develops designated communication switches that give the organizations transparency and improvement in transferring critical data along the organizations’ networks and infrastructures, while filtering the data through the system and the various probes. The solution includes a platform of products in various sizes and with different capabilities from single port duplicators to large port-count switches.
Gigamon has a diverse list of customers from telecom, banking, industry and security worldwide (over 80,000 working units around the world).