About Optical Paths Company
Secure email gateways (SEGs) provide basic message transfer agent functions;
inbound filtering of spam, phishing, malicious and marketing emails; and outbound data loss prevention and email encryption.
Next-Generation Firewall (NGFW) is wire-speed integrated network platform that combines a traditional firewall with other network device filtering functionalities such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS) and/or other techniques such as SSL and SSH interception, website filtering, QoS/bandwidth management, antivirus inspection and third-party integration.
Gets ahead of cyber criminals by calculating every possible internal and external “attack path” to your most valuable digital assets – before they do. We give you a prioritized list of the most vulnerable paths to your most valuable digital assets.
The root cause of these vulnerable attack paths is that networks have grown so large and complicated they’ve outpaced our human ability to manage every aspect of them.
A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.
In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.
Usually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices).
Endpoint Management and Security Suite unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly and more effectively address IT risk and systems management requirements across the enterprise. Endpoint Management and Security Suite delivers best-in-class capabilities across patch management, application control, anti-virus, device control, and disk encryption.
Governance, Risk Management, and Compliance (GRC) are three pillars that normally work together, in conjunction within an organization with the important purpose of assuring that it meets its objectives.
Governance is the combination of processes established and executed by the board of directors that reflects the organization's structure, how it is managed, led and driven towards the achievement of its goals. Aligned with the risk management, which involves the prediction and management of risks that could hinder the organization to achieve its objectives, and the compliance with the company's policies and procedures, laws and regulations, a strong and efficient Governance is considered key to organization's success.
Identity and Access Management (IAM) Identity and access management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons, and to meet increasingly rigorous compliance requirements.
This security practice is a crucial undertaking for any enterprise. It is increasingly business-aligned, and it requires business skills, not just technical expertise.
Enterprises that develop mature IAM capabilities can reduce their identity management costs and, more importantly, become significantly more agile in supporting new business initiatives.
Security information and event management (SIEM) is a term for software products and services combining security information management (SIM) and security event management (SEM). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications.
Advanced Security Operations Center (SOC) solution is a combination of technology and services that gives security operations teams’ complete visibility to identify and investigate attacks, the ability to detect and analyze even the most advanced of attacks before they can impact the business, and the tools to take targeted action on the most critical incidents.
Secure Web gateway solutions protect Web-surfing PCs from infection and enforce company policies. A secure Web gateway is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. These gateways must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM) and Skype. Native or integrated data leak prevention is also increasingly included.
Vulnerability management is the "cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities", especially in software and firmware.
Vulnerabilities can be discovered with a vulnerability scanner, which analyzes a computer system in search of known vulnerabilities, such as open ports, insecure software configuration, and susceptibility to malware.
Nexthink mission is to help IT departments transform the way they service and support business end-users. Our tag line, change your perspective, reflects this mission. When you add end-user perspective, you will see your IT infrastructure as never before and transform your IT services, operations and support.
Uniquely capture all local and network activities in real-time at all your endpoints and transform end-user data into actionable analytics:
- Always know what’s going on: Never lose sight, have all the data with the power to extract what’s relevant and drill-down for a closer look in seconds
- Verify Shadow IT and BYOD: Assure security posture and compliance, understand new risks, and act before it is too late.
- Detect abnormal behaviors: Don’t wait for damages to reveal what’s putting your sensitive data at risk, from inside and external threats.
- Forensics at warp speed: Explore in seconds, massive historical and contextual data to quickly handle incidents with informed responses.
- Be alerted when you are exposed: Know immediately that a malware has not been detected by the antivirus or when an application accessing a dangerous web site.
- See the real user experience: Self-discover, map and baseline all IT services by analyzing real activity and measure business impact by department and service.
- Measure the impact of changes: Visualize in a single timeline all events, related progress
and issues to act and communicate accordingly.
- Apply proactive remediation: Understand commonalities of frequently crashing applications, long login times, locations with low network quality and more.
- Accelerate problem resolution: Helpdesk and support teams determine in seconds if the endpoint, the network or the back-end is the probable cause.
Optimize assets and costs: Find places to improve such as underused hardware and software, wasted print jobs, unnecessary PC renewals.