Security Management Systems

Corporate data access control and restriction is a key task of information security. The correct approach to its solution will allow not only to realize completely organizational fundamentals of information security policy by technical means, but also will help to automate certain tasks of IT divisions, will reduce risks of information security threats realization, and will give opportunity of the IT solutions safe implementation aimed to business processes mobility increase (for example, remote access, BYOD).

 

SOLUTIONS USED FOR SECURITY MANAGEMENT SYSTEMS CREATION

NETWORK ACCESS control AND ACCOUNT SYSTEMs

Vendors: Cisco

ADMINISTRATIVE ACCESS  MONITORING SYSTEMS

Vendors: Dell, IBM, NetIQ, Centrify

Security information and events management systems (SIEM)

Vendors: IBM (Q1 Labs), HP (ArcSight), McAfee (NitroSecurity), NetIQ

CONFIDENTIAL INFORMATION LEAKAGE PREVENTION SYSTEMS

Vendors: Symantec, McAfee, Websense, RSA

 

NETWAVE COMPANY APPROACHES to SECURITY MANAGEMENT SYSTEMS REALIZATION

  • Security systems implementations taking into account specifics of customer infrastructure
  • Ensuring reliable functioning and fault tolerance of security systems
  • Ensuring reliable level of security systems protection
  • Solution documenting