Identity Management
• Consumer Identity
• Identity & Access Management
• Multi-factor Authentication
• Key Management
• Identity Governance
• Privileged Access Management (PAM / PIM)
• Public Key Infrastructure (PKI)
Application Security
• Cloud Access Security Broker (CASB)
• Web Application Firewall (WAF)
• File Upload Security
• Email Security Gateway
• Cloud Application Gateway Solution
• Application Load Balancer
• Domain Anti Spoofing (DMARC / DKIM / SPF Compalince)
• Data Masking
Data Security
• Information / Data Classification
• Information Rights Management
• Data at-rest encryption
• Data Tokenization
• Data Segmentation
• Database Security
• Database Firewall
• File Integrity Monitoring
• File Exchange Security Solution
• Managed Security File Transfer
• Data masquerading
• API Security
Endpoint Security
• Endpoint Protection Platform / Anti Virus / Anti Malware
• Endpoint Threat Detection, Prevention & Response
• Device Control
• Vulnerability & Patch Management
• Behaviour Monitoring & Anomaly Detection Protection
• Host IDS / IPS
• Access Control
• Unified Endpoint Management
• Mobile Device Management
• Application Control
Security Orchestration & Advanced Threat Prevention
• Threat Intelligence Gathering and Correlation
• Threat Intelligence Sharing
• Security Orchestration & Automated Response
• Security Operations Center as Application Platform
• Advanced Threat Hunting
Security Monitoring
• Security Incident Event Monitoring (SIEM)
• Behaviour Monitoring & Anomaly Detection Protection
• User, Entity Behaviour Analysis (UEBA)
• Log Management
• Network, Server, Applications & Database Monitoring
Network Security
• Next Generation Firewall
• Unified Threat Management (UTM)
• Web Security Gateway (Proxy)
• Advanced Persistent Threats Protection
• DNS Security
• Network Segmentation
• Network Access Control
• DDOS Protection
• Remote Secure Access
• Data in transit encryption
• Network IPS
• Network Anomaly Detection & Response
• Wireless Network Security
General Cyber Security Services / Solutions
• Penetration Testing Services
• RED Team Assessments
• Managed Security Monitoring & Response
• Managed Security Operations Management
• Incident Response Service
• Compromise Assessment
• ISO 27001 Implementation
• PCI DSS Implementation
• Risk Assessment
• Vulnerability Management
• SSL Certificates
• Cyber Security Training & Awareness
• IT Services Management Solution (ITSM)
Forensics
• Mobile Forensics
• Fraud Detection
• Evidence Management
• Forensics Case Management
” I would love to hear from you, whether you have a query related to solution design, standalone system or multiple systems, integration with other systems, or a budgetary proposal, please email or call me for non-obligatory technical consultation “
Copyright © 2013-2020 December Update. Almoayed Group WLL. All Rights Reserved.