Palo Alto Networks
We offer many services that facilitate the implementation of your firewall. This firewall helps to detect and to defend against cyber-attacks. Palo Alto Networks is based on the control of applications instead of the conventional port control. Nowadays, software, protocols and certainly attackers too use standard ports, like HTTP port 80, to tunnel their own application through a conventional firewall. Palo Alto Networks Appliances identifies and monitors the user and the content as well as applications regardless of which port is being utilized. Together with content security (anti-virus, anti-spyware, URL filter) and endpoint security, a complete, centralized and high-performance security gateway is established that can be used by local, VPN and SSL users as well as by users with mobile PCs.
Cisco IDS / IPS (Intrusion Detection System / Intrusion Prevention System)
Cisco has a whole portfolio of security solutions for the changing security needs of consolidated, highly virtualized and cloud-based environments. These solutions protect high-performance data centres and mobile work environments even more comprehensively:
- A highly scalable software for the most frequently used firewall worldwide, Cisco Adaptive Security Appliance (ASA)
- A virtualized ASA for multi-tenant environments
- A new Intrusion Prevention System (IPS), that features the highest performance and an efficient application protection in data centres
- Sourcefire as a multi-stage protection for intrusion prevention
Cisco ESA / WSA (Web Security Appliance / Email Security Appliance)
Cisco IronPort Web Security Appliance (WSA) has been developed for companies of any size and it combines conventional techniques for URL filtering with innovative filters for reputation and malware on a single device. This multi-layered system to prevent threats in conjunction with an exceptionally powerful web proxy ranks amongst the leading solutions for protection from web-based threats. Cisco Email Security Appliance (ESA) helps to set out the rules accurately. Harmful e-mails can be fought off in several layers or they will at least be defused. ESA, particularly the recently launched version 10, offers possibilities for configuration to ward off spoofing / CEO fraud, malware and other attacks successfully.
Currently Cisco offers the most comprehensive portfolio of solutions for Advanced-Malware-Protection (AMP) in the industry. These solutions are characterized by complete transparency and control in the entire extended network – and protection against malware that completely covers the whole sequences of an attack, i.e. before, during and after an attack.
Microsoft Azure Active Directory
Azure Active Directory (Azure AD) is a comprehensive Cloud solution to administer identity and access and offers a whole range of robust features for the administration of single users as well as groups. With this solution, you can ensure secure access onto local and Cloud applications; for instance, Microsoft web services like Office 365 or many Software-as-a-Service (SaaS) applications of other providers.
With the Identity Services Engine (ISE), Cisco offers a solution that allows you to control the access to the network centrally. Here, one can define client requirements and the resulting access rights for Wired LAN, Wireless LAN as well as VPN. Additionally, administrators receive detailed information via ISE as to who and when someone logs onto the network and with which device.
SafeNet solutions for the protection of identity and data by Gemalto offers a comprehensive range of products for encryption, multi-factor authentication and key management. These products guarantee the protection and the ownership of sensitive data throughout the whole lifecycle – when creating, retrieving, sharing, saving and transferring. That way, companies stay completely protected and compliant all the way from the data center to the Cloud and will stay in full control too – no matter what business they are dealing with.
For quite some time OpenDNS, a solution that can be integrated into the Cisco security portfolio, is available. This solution is evidently able to combine all requirements with security and this without adding complexity. DNS is responsible when IP addresses must be figured out behind domain names. Every one of us and essentially all our devices use DNS on a daily basis. Without DNS, most of our applications would not be functional at all. OpenDNS offers protection at DNS level that does not depend on the protocol and it provides all the information that was collected in order to give defenders the opportunity to be informed swiftly of the current security status. Here, any desired location and any possible client can be integrated into the security concept – and this with minimal effort.