Data centre
Cyber Security
IT and OT Network Security
Telco

We provide security in the intersecting worlds of IT and OT.




Technology from global leaders


Efficient security infrastructure


Solutions fully scalable to customer needs


A unique approach to IT and OT networks security


Service monitoring 365/7/24
DDoS Attack Protection



Advantages:

  • A counterattack in the least restrictive way possible to the expected IP traffic.
  • Two service variants.
  • Detection of volumetric type attacks.
  • Detection of attacks directed at the exhaustion of system resources.
  • Detection of attacks against a specific application used to provide a service.
  • Proactive, continuous monitoring of all network traffic based on IP Netflow packet analysis.
  • Security is up-to-date due to the daily updating of attack signatures.
  • Configurability tailored to customer needs.
Corporate Token

Advantages:

 

  • Authentication of remote user connections.
  • Authentication of internal network-directed VPN connections coming from the Internet.
  • Authentication of corporate network traffic.
  • Protection of sensitive data on internal and external networks.
  • Controlled access to important applications from outside the corporate network.
  • Prevention of manipulation of administrative network settings.
Corporate UTM

Advantages:

  • Firewall protection of the connection to the Internet.
  • Intrusion Prevention System (IPS) detection.
  • E-mail protection by anti-virus and anti-spam systems.
  • Protection of network users by application control.
  • Filtering of content and blocking of access to dangerous websites.
  • Securing remote network access (SSL VPN).
  • Strong authentication.
  • Many additional functionalities (web acceleration, online logs or security statistics report).
  • Several service variants.
Industrial network protection 

Advantages:

  • Passive implementation does not require changes in the network structure.
  • Real-time monitoring and visualisation of network activity.
  • Detection of network anomalies using built-in rules and signatures.
  • Observation and creation of network behaviour models.
  • Creating custom alarms and data analysis criteria.
  • Vulnerability detection of elements included in the monitored network.
  • Mechanisms helping to analyse the emergence of threats and locate their sources.
  • Presentation of information in graphical and tabular form.
  • Monitoring of installations in various locations from one desktop.
  • Intuitive and fully configurable user interface.
  • Automatic integration with the most popular SIEM systems.
Data centre
Cyber Security
IT and OT Network Security
DDoS Attack Protection



Advantages:

  • A counterattack in the least restrictive way possible to the expected IP traffic.
  • Two service variants.
  • Detection of volumetric type attacks.
  • Detection of attacks directed at the exhaustion of system resources.
  • Detection of attacks against a specific application used to provide a service.
  • Proactive, continuous monitoring of all network traffic based on IP Netflow packet analysis.
  • Security is up-to-date due to the daily updating of attack signatures.
  • Configurability tailored to customer needs.
Corporate Token

Advantages:

 

  • Authentication of remote user connections.
  • Authentication of internal network-directed VPN connections coming from the Internet.
  • Authentication of corporate network traffic.
  • Protection of sensitive data on internal and external networks.
  • Controlled access to important applications from outside the corporate network.
  • Prevention of manipulation of administrative network settings.
Corporate UTM

Advantages:

  • Firewall protection of the connection to the Internet.
  • Intrusion Prevention System (IPS) detection.
  • E-mail protection by anti-virus and anti-spam systems.
  • Protection of network users by application control.
  • Filtering of content and blocking of access to dangerous websites.
  • Securing remote network access (SSL VPN).
  • Strong authentication.
  • Many additional functionalities (web acceleration, online logs or security statistics report).
  • Several service variants.
Industrial network protection 

Advantages:

  • Passive implementation does not require changes in the network structure.
  • Real-time monitoring and visualisation of network activity.
  • Detection of network anomalies using built-in rules and signatures.
  • Observation and creation of network behaviour models.
  • Creating custom alarms and data analysis criteria.
  • Vulnerability detection of elements included in the monitored network.
  • Mechanisms helping to analyse the emergence of threats and locate their sources.
  • Presentation of information in graphical and tabular form.
  • Monitoring of installations in various locations from one desktop.
  • Intuitive and fully configurable user interface.
  • Automatic integration with the most popular SIEM systems.
Telco
Innovations
Zapraszamy do kontaktu

005-secure-shield nask logo
Witaj, strona NASK SA wykorzystuje pliki cookies do analityki (google analytics, facebook) na zasadach określonych w polityce prywatności.
Jeżeli nie wyrażasz na to zgody, prosimy Cię o wyłączenie obsługi cookies w przeglądarce lub opuszczenie strony.