Security
We integrate security solutions into your existing infrastructure, raising productivity, supporting regulatory requirements, and ensuring a rapid return on investment.
At Combis, we provide three key elements: experts with specialised knowledge and skills in various areas of information security; top-notch technology capable to identifying the most complex security threats, and processes that can be adapted to meet the needs and wishes of any work environment.
The most advanced information security technology and our top expertise. 30SEC is a combined service of threat detection, threat response, data analysis, reporting, and prevention. It includes antivirus protection, malware protection, firewall, e-mail security, web security, SIEM, SOAR, and other solutions.
These services determine the level and quality of security of a given computer system. The aim is to test the system for the detection of breaches, and to timely notify the service owner of any breaches.
After testing, security issues are clearly identified and suggestions made on how to remove them. Combis also provides penetration testing depending on the type and quantity of information that is available in advance, and we can also perform verification of web applications, mobile applications, network devices, and other services.
Penetration testing services are performed by Combis experts who hold recognized security certification, thereby ensuring quality service.
This solution enables all business documentation and information to be organized and classified according to critical information levels. In this way, it is possible to define security rules and to manage and control risks.
Combis solutions support e-mail classification systems, Office documents, documents saved on sharepoint repositories, and generic classifiers that can classify previously created documents into new groups. The central console enables classification rules to be centrally applied to all computers in the IT system. The document classification system is most often integrated into data leak prevention (DLP) platforms, in order to better control document flows within and outside the company, and to prevent any undesired data leaks.
Access control is a part of the security policy present in every protected system, including computer systems and networks. In computer systems, access control is achieved through three steps: Authentication (digital identity confirmation), Authorization (granting access to resources), and Accounting (monitoring activity, access to resources, etc.). In order to ensure that access control rules are consistent across the network and to enable simpler management of existing rules and creating new rules, a centralized system is applied for controlling access to network resources. The Network Access Control (NAC) system enables control of access and allows the addition of additional limitations and rules for accessing network resources.
In response to password-related problems, new solutions enable strong authentication based on single-use passwords. Using renowned global solutions, strong authentication can be implemented at all entry points into the system, and these can be integrated with development tools to ensure that all systems and applications are properly protected from any attempts at unauthorized access. The user can select the desired authentication method depending on the many different forms, sizes and types of devices involved (hardware, mobile, SMS) that generate single-use passwords to grant access to the system. By using this approach, access security is drastically increased without negatively impacting the user experience.