Firewall and Unified threat protection (UTM): with a single appliance you have access to multiple security functions
(Cloud) Web security: react in real time in case of an intrusion
Network access control (NAC): automate access to your network on the basis of the users’ and/or devices’ identity
SSL Virtual Private Network (VPN): get control of users who access your company’s resources from several sites
Intrusion prevention systems (IPS): monitor your network activity, applications and users
(Explore) DDoS protection: protect your organization against distributed denial of service (DDoS) attacks paralyzing your website
DNS security: domain name (DNS), addressing (DHCP) and IPAM (IP address management) solutions
SSL encrypted traffic: provide visibility into encrypted traffic and offer decryption of your network traffic
Data leakage prevention: prevent any disclosures of information
Web application firewalls (WAFs): identify and ward off attacks
Ensure from total outsourced protection against spam and viruses
(Cloud) Strong authentication: your employees access your company’s network by means of an identifier and a one-time password
Privileged account security: detect and respond to in-progress cyber attacks
Protect your desktops, laptops and smartphones.
Protect your (virtual) datacenters and your cloud services.
Your website and customer data must be completely secure. This is important for you, for your customers but also for the reputation of your company. As from 25 May 2018, everyone who manages personal data of others must secure this data against piracy. Order a simple security check of your website now.
Solution designed around a three-layer model:
Network security forensics: all network communications are logged and analyzed in real time
Vulnerability Assessment Management (VAM) as a Sevice: scan your network and assess all existing vulnerabilities. The vulnerabilities are ranked on urgency and enriched with remediation information
Under the lead of our CSIRT (Cyber Security Incident Response Team), we help you to adequately prepare for and cope with cybersecurity incidents. We offer the following services:
Training given at the Proximus ICT Academy.
We help you meet your cybersecurity challenge with different courses explaining either the basics of internet security or more advanced trainings on hacking, pentesting, wi-fi, ...
If your website stores and manages personal data of others, you are responsible for keeping this data safe and secure. This is an important factor for ensuring customer trust in your company and brand. But it is also mandatory under the new Data Privacy Regulation, which enters into effect on 25 May 2018.
Security Check is meant to signal any security risks that might occur on your website or the server infrastructure behind it.
After completion of the security check, you will receive: