cyber security

the information revoulotion gives you unlimited options- as well as unlimited threats

SIEM

Security Information and Event Management (SIEM) software works by collecting log and event data that is generated by host systems, security devices and applications throughout an organization’s infrastructure and collating it on a centralized platform. From antivirus events to firewall logs, SIEM software identifies this data and sorts it into categories, such as malware activity, failed and successful logins and other potentially malicious activity.

Top Vendors

SIEM

SANDBOX

A sandbox environment is an isolated virtual machine in which potentially unsafe software code can execute without affecting network resources or local applications.

Top Vendors

VA

A vulnerability assessment is a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.

Top Vendors

PT Automation

The XM Cyber Attack-Centric Exposure Prioritization platform continuously simulates attacks on your business-critical assets and provide prioritized remediation advice.

Top Vendors

UBA

User behaviour analytics (UBA) is the tracking, collecting and assessing of user data and activities using monitoring systems.
UBA technologies analyse historical data logs including network and authentication logs collected and stored in log management and SIEM systems to identify patterns of traffic caused by user behaviours, both normal and malicious. UBA systems are primarily intended to provide cybersecurity teams with actionable insights.

Top Vendors

UBA

INTELLIGENCE

Threat intelligence, or cyber threat intelligence, is information an organization uses to understand the threats that have, will, or are currently targeting the organization. This info is used to prepare, prevent, and identify cyber threats looking to take advantage of valuable resources.

Top Vendors

AUTOMATION

Security automation is the machine-based execution of security actions with the power to programmatically detect, investigate and remediate cyberthreats with or without human intervention by identifying incoming threats, triaging and prioritizing alerts as they emerge, then responding to them in a timely fashion.

Top Vendors

AUTOMATION​

PT + EXPOSURE SURVEY

Our penetration test is performed by cybersecurity experts to find areas of weakness in the cybersecurity of a company’s IT environment. After the test is performed report is provided to the company so that they can focus their money and time on addressing the most critical findings to reduce the overall risk of their company. During the test we emulate a real attacker that will use the latest exploits to gain unauthorized access and escalate privileges. Also, certain industries that deal with sensitive data such as financial data are required by law to have an annual penetration test. We also provide automated Exposure Survey using advances techniques and tools to find vulnerability and exposure records. All these services are being provided by our own consulting services company
Sysec Web Intelligence – Webint.co.il

Top Vendors

BloxOne Threat Defense

Infoblox BloxOne Threat Defense strengthens and optimizes your security posture from the foundation up. It maximizes brand protection by securing your existing networks as well as digital imperatives like SD-WAN, IoT and the cloud. It uses a hybrid architecture for pervasive, inside-out protection, powers security orchestration, automation and response (SOAR) solutions by providing rich network and threat context, optimizes the performance of the entire security ecosystem and reduces your total cost of enterprise threat defense.

Top Vendors

Web Isolation

With a Browser Isolation solution, you can separate your users’ web browsing activity from the local network and its infrastructure, thus preventing browser-based attacks on the network, while providing your users with secure web access at the same time. This protects your endpoints and networks from known variants of malware, and more importantly, it also protects them from unknown, or zero day threats, that are often not covered by your traditional detection-based solutions, like the various antivirus software solutions commonly available.

Top Vendors

Skip to content