Product portfolio
Privileged Access Management is a solution that manages privileged access across an organization and ensures privileged accounts are audited, managed, controlled and protected from abuse. A privileged account provide ...
Approximately 80% of all cyber incidents are caused by human error. Companies are making huge investments in cyber security awareness programmes, but few CIOs are truly satisfied with the results. The PSAT is a comp ...
Tenable products have long been at the forefront of vulnerability management. Tenable's broad range of tools provides customers with an effective approach to vulnerability management based on individual needs, size a ...
It is designed primarily for managers of areas (standards, laws) who need to keep track of all their mandatory activities, activities and at the same time have a tool that alerts them if something is not implemented i ...
Endpoint protection is accomplished using Cisco Secure Endpoint technology. A cloud service that uses an installed client to monitor the status and behaviour of devices. This makes it possible to detect device infec ...
Protecting email communications is an absolute staple in cybersecurity, as email is the most common attack vector. Protection is provided by the Cisco Secure Email Appliance, a technology that has a long and successf ...
The NGFW firewall is a modern type of firewall that allows you to control and protect against modern threats on the Internet. The basic function of a firewall is to divide the network into a secure (internal) network ...
The Cisco Identity Service Engine (ISE) product is at the heart of any secure network. It controls device access to the network, ensuring that only known and secure devices and users connect to the protected network. ...
Splunk is a universal data platform that collects, stores, and analyzes any machine-generated data (e. g. , logs, metrics, configurations, reports) from any data source (e. g. , computers, virtual machines, network de ...
Protecting web communications is one of the fundamental pillars of security. It protects users from attacks such as phishing and can prevent access to malicious websites that may contain malicious code or malware.