Information Security

 

 

Access Control

Access control is way of limiting access to a system or to physical or virtual resources. In computing, access control is a process by which users are granted access and certain privileges to systems, resources or information. In access control systems, users must present credentials before they can be granted access. In physical systems, these credentials may come in many forms, but credentials that can"t be transferred provide the most security. (Infoblox, Guardium, SafeNet, Ixia and Dell Software)

Risk Management

Risk management is the identification, analysis, assessment, control, and avoidance, minimization, or elimination of unacceptable risks. An organization may use risk assumption, risk avoidance, risk retention, risk transfer, or any other strategy (or combination of strategies) in proper management of future events.

Risk Management continuously monitors the entire corporate network and generates lists of vulnerabilities and deep risk metrics prioritized by importance for the IT Security decision maker.

To ensure that the vulnerabilities are in fact relevant and do exist in context for the organization, it is then critical to automate the penetration testing of each of the vulnerabilities so that the list can be narrowed down to what is truly important to look at right away. It is also crucial to automatically produce a visual network topology map in order to understand how vulnerabilities at the network level, due to security configuration not being compliant in some areas of the network, can affect other areas of the network.

This enables organizations to create threat models to proactively understand where threats can come from.

Finally, many modern threats today target applications in some way, whether it is internal or external facing applications, and therefore understanding and resolving application vulnerabilities while they are being developed, and prior to being deployed, is essential. (ARBOR, BLUE COAT, Tripwire, CORE SECURITY, AppScan and SpectorSoft)

Secure Mobility

Secure Mobility enables organizations to put into effect their corporate data governance policies at the user level, so that each user is mandated to understand what data should be classified as sensitive, and what data should not be.

Once collaboration on sensitive data is required, platforms are put into place to ensure complete control on files, emails and even text within documents, to ensure that sharing is done securely, both internal, as well as, external to an organization, so that data cannot be maliciously or mistakenly leaked. The secure file sharing platforms also provide mechanisms to seamlessly automate secure site-to-site and user-to-site transfers, as well as, to use email to securely send and receive large attachments without restrictions.

Finally this invaluable sensitive data needs to be available today to the mission critical workforce, 24x7 online, as well as offline, so portability is critical.

Therefore secure information sharing would not be complete without the ability for trusted users to securely transport data, and even their entire workspace environment, on hardware encrypted portable storage, with comprehensive management of this media.

(AirPATROL, MobileIron, BOOLEserver, IRONKEY, IPSWITCH and TITUS)

Advanced Threat Protection

Advanced Threat Protection provides visibility into all relevant network traffic coming in and going out of the organization.

This ensures that protection mechanisms are applied only where attacks can happen by analyzing the required traffic, web, email, file etc., to determine whether the traffic contains signature-less threats that attempt to communicate back to the command and control centers (CnCs) for data exfiltration, and to stop any such communication.

Once malware does enter a corporate environment, it is crucial to gain security intelligence into where it attempts to travel within the corporate network and conduct network forensics to understand its reputation. Simultaneously, a platform needs to be in place to ensure that any unknown malware cannot execute on any IT managed resource so as to avoid any adverse direct effects to the computing environment. Finally with effective, powerful, and easy-to-use endpoint forensics and incident response capabilities, modern malware can be seamlessly removed.

(FireEye, VENAFI, websense, Paloalto networks and CARBON BLACK)

Physical Security Products

EFADA Technology is a partner to Milestone Systems. Milestone Systems - founded in 1998 - is a world-leading provider of open platform IP video management software (VMS) with headquarters in Copenhagen, Denmark.

Company objective is to improve clients’ organizational processes and increase overall security through the management and distribution of digital video data.

  • Milestone XProtect® Software Suite

Are you looking for video surveillance software?

Milestone Systems is the worlds leading provider of open platform IP video management software (VMS) and more than 100,000 customers use its XProtect VMS worldwide. XProtect is a powerful, easy to use and open architecture with a wide array of features for basic to advanced surveillance needs. This means that all XProtect products are compatible with more IP cameras, encoders and digital video recorders than any other VMS manufacturer products, giving you the freedom to mix and match hardware to fit your needs and budget.

• Milestone Husky™ NVR Series

Need a network video recorder with integrated surveillance software?

The Milestone Husky series offers performance-optimized network video recorder (NVR) solutions. Powerful, fully integrated solutions with extraordinary processing power to meet the stringent demands of any surveillance environment.The innovative Milestone Husky Series is the result of challenging the convention and delivering a more powerful, all-in-one solution with optimized processing power to meet the stringent demands of any surveillance environment.

• Milestone Arcus™

Need an embedded video surveillance solution?

Milestone Arcus™ is a video surveillance platform embedded in hardware devices, enabling Milestone hardware technology partners to deliver customized, market-ready solutions.