Kibernetska varnost eng

Security Operations

Security Information and Event Management Security Information and Event Management helps security teams accurately detect and prioritise threats across the enterprise, and it provides intelligent insights that enable teams to respond quickly to reduce the impact of incidents. By consolidating log events and network flow data from thousands of devices, endpoints and applications distributed throughout […]
Read More

Critical Infrastructure Protection

Zaščita kritične infrastrukture For many years, industrial systems and critical infrastructure had no connection to the outside world. That is why they did not deal with the same kinds of vulnerabilities. Today, IT/OT convergence is a cornerstone and an enabler for Industry 4.0 and IoT. Due to the standardisation of communication protocols and growing interconnectivity, […]
Read More

Detection and Response

Extended Detection and Response Extended detection and response solutions automatically collect and correlate data from multiple security products to improve threat detection and provide an incident response capability. Unlike SIEM, XDR (Extended Detection and Response) is an actual collection of products merged into a single solution. For example, an attack that caused alerts on email, […]
Read More

Information Protection

Data Loss Prevention Nowadays, preventing data loss is an important factor in the context of comprehensive cyber security. Losses occur on several levels. This needs to be prevented. Losses occur on several levels: at rest (data storage), in motion (network traffic) and during use (workstations). We provide this prevention (Data Loss Prevention: DLP) with software […]
Read More

Identity & Access

Multi-factor Authentication Multi-factor authentication is an electronic authentication method. Multi-factor authentication (MFA) is an electronic authentication method in which a computer user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence. Something you know: Certain knowledge only known […]
Read More

Secure Gateway

Firewall A firewall protects our internal network, resources, and data from the dangers and threats that exist in external networks, such as the Internet. Merely filtering traffic according to protocols has been insufficient for firewalls (FW) for a long time now. The future of firewalls (FW) is moving in the direction of machine learning and […]
Read More