Products
DISCOVER OUR SOLUTIONS
McAfee
FILE INTEGRITY MONITORING
McAfee Integrity Monitoring for Data
Cost-effective database solution to assess and monitor the security of base systems
McAfee Integrity Monitoring for Databases tests systems for common configuration vulnerabilities, monitors changes to such configuration, and helps you create a custom security policy to access your sensitive data, providing visibility into potentially configuration changes. hazardous and making it easier to demonstrate compliance.
Centralized checks of database configuration settings – McAfee Integrity Monitoring for Databases is an easy-to-install solution for assessing the security status of the most popular database platforms (Oracle, Microsoft SQL Server, IBM DB2, and MySQL) in an enterprise, including version and patch level, audit settings, configuration parameters, and privileges.
Better visibility into the security level of databases – By assessing and monitoring database configuration settings and access to sensitive data, organizations can demonstrate regulatory compliance and minimize probability of a data breach.
DLP HOST/ NETWORK
MCAFEE INTEGRITY MONITORING FOR DATA
McAfee Host Data Loss Prevention offers unmatched protection against theft and accidental disclosure of sensitive data. This protection affects all networks, applications and removable storage devices.
- Data Transfer Methodology: Controls how your business transfers data across networks, applications, and removable storage devices.
Data protection in any format: even if it has been modified, copied, pasted, compressed or encrypted. - Data protection in any format: even if they have been modified, copied, pasted, compressed or encrypted.
- Control of data transferred to removable storage devices, like USB sticks, iPods and other removable storage devices and end data loss through endpoints.
- Data encryption simplification: Host Data Loss Prevention with Endpoint Encryption increases efficiency in content-aware encryption.
- Centralized administration console: Define and manage data protection policies, install and update agents, monitor events in real time, and report compliance with regulatory compliance requirements, all from the centralized McAfee ePolicy Orchestrator (ePO) management console.
Microsoft
PRODUCTS
OFFICE 365 BUSINESS
Best for businesses that need Office applications, plus cloud file storage and sharing on PC, Mac, or cell phone. Business-class email not included.
- Apps Office included
- MicrosoftOutlook
- MicrosoftWord
- MicrosoftExcel
- MicrosoftPowerPoint
- MicrosoftAccess (PC VERSION)
- MicrosoftOneDrive
RSA
THREAT DETECTION AND RESPONSE
RSA creates a wide range of industry-leading products that enable clients to take control of risk.
RSA NETWITNESS – DETECTION AND ADVANCED RESPONSE TO THREATS
Triple the impact of your security team with RSA NetWitness® Platform, our industry-leading threat detection and response platform. Leverage cyber threat intelligence, packages, endpoints and logs, plus machine learning and security analytics technologies, to accelerate detection of the most advanced and evasive threats, discover the full scope of a compromise, and help to automate incident response.
- Advanced threat protection
- Endpoint threat detection and response
- Orchestration and security automation
- Malware detection
- Network detection and response
- User and entity behavior analysis (UEBA)
- SIEM & Beyond
IDENTITY AND ACCESS MANAGEMENT
Accelerate your business and minimize identity risk while providing convenient and secure access to your extended business. RSA SecurID® Suite is a comprehensive identity and access management solution that offers capabilities for authentication, access management, risk analysis, identity management, and user lifecycle management, and supports local and cloud-based systems.
- Multi-factor authentication and identity assurance
- Identity governance and RSA® lifecycle management
Check Point
DLP HOST / NETWORK
Check Point – End Points security.
Endpoint security agent that includes all the characteristics and functions necessary for a real and efficient security. It is not necessary to spend as much time and resources in testing, configuration and implementation of a security solution. This agent combines the best firewall, network access control (NAC), program control, anti-virus, anti-spyware, full hard drive encryption, media encryption, with port protection and remote access, all in one agent.
The new version – R72 features
- Federation of Servers:It offers better updating of clients and optimization of band consumption.
- WebCheck: Virtualization of web browsing, protection against and malicious sites.
- OneCheck: Unification of system authentications, a simpler experience for the user.
- Endpoint Connect: Use of the most simplified and optimized VPN client.
The suite includes: - Endpoint Security Management
- Check Point Policy Management
- Endpoint Security Products
Vmware
DATA CENTER PLATFORM DEFINED BY SOFTWARE
Build your software-defined digital foundation with industry-leading technologies.
VMWARE CLOUD FUNDACIÓN
Integrated cloud infrastructure and management services for public and private clouds.
VMWARE CLOUD ON DELL EMC
Beta program to provide perimeter and data center infrastructure as a service.
CLOUD INFRASTRUCTURE AND DATA CENTER
Transform your IT architecture easily with cloud infrastructure for virtual data centers.
VSPHERE
Efficient and secure computing platform for the hybrid cloud.
VSPHERE INTEGRATED CONTAINERS
Container business infrastructure for traditional and container hoisted applications.
Hitachi
INFORMATION SYSTEMS AND TELECOMMUNICATIONS. SOLUTIONS AND SERVICES
CONSULTANCY
Hitachi offers business consulting services to help clients establish business strategies, improve operational processes, and create IT strategies. Hitachi also offers IT consulting services to help customers install and operate state-of-the-art IT.
IT / COLLABORATION STRATEGIES
Hitachi offers a wide range of key solutions for corporate IT strategies. These include the use of big data through the Data Analytics Meister service that uses a wide range of cutting-edge technology, as well as cloud solutions consisting of hardware with high reliability, usability and expandability. Other strategies include thin client solutions that support work style reforms and ERP that serves as the foundation for improving operational efficiency and optimizing overall management.
INDUSTRIES
Hitachi offers a variety of custom solutions and packaged software to support professional operations in industries such as finance, manufacturing, distribution, wholesale and retail, government (national and local governments, as well as public institutions), education and medicine. . Hitachi provides services that improve operations and make them smarter.
IT PLATFORM / INFORMATION SECURITY
It offers a wide range of IT platform solutions, including scalable storage solutions that can be adjusted based on purpose and usage, and network solutions that accelerate business through highly reliable network systems. In addition, it offers security solutions to build secure information systems through the use of biometric platforms that include finger vein authentication, encryption solution and other security-related technologies.
Globalscape
EFT ARCUS
EFT Arcus is a SaaS MFT solution for organizations seeking the agility, elasticity, and cost savings that the cloud provides. Reduce the complexity of your file transfer infrastructure, increase operational efficiency, and protect your critical data using our secure managed file transfer cloud service. With our MFT cloud service you can:
- Automate the exchange of data between people and systems
- Gain visibility into data movement
- Replace legacy or local file sharing systems
- Share files securely internally or externally
- Facilitate compliance with regulations such as SOX, FIPS, HIPAA, CCPA, PCI DSS and others
EFT PLATFORM
POWERFUL MFT SOLUTIONS
Secure and manage your data transfers with ease.
Global Cape’s Enhanced File Transfer Platform (EFT) is comprehensive and easy-to-use Managed File Transfer (MFT) software. It is available in the cloud / SaaS (EFT Arcus) and in local EFT implementations. Our local options are EFT Enterprise and EFT Express.
Features of EFT include:
- Built-in regulatory compliance control
- Visibility, auditing and reports
- Scripting-free workflow automation and folder monitoring.
- Two-factor authentication
- High availability deployment options
- Data encryption at rest and in transit
- Single sign-on
- EFT Enterprise
Kaspersky
INTERNET SECURITY
Stay safe, no matter what you do at work and at home. For anything you do online, whether it’s on your PC, Mac, or Android devices, our one-license suite of advanced security apps protects you from malware, spy webcams, financial scams, and more.
- Block viruses, attacks, cryptolockers, and much more
- Prevents online tracking to collect your data
- Detect hidden spyware on your Android device
- Protect payments, thanks to bank-type encryption
- Block unauthorized access to your webcam
- Encrypt the data you send and receive online, on the VPN
Tenable
IMANAGEMENT OF VULNERABILITIES, IN YOUR OWN FACILITIES
With Tenable.sc you get a complete picture of your network while keeping your data under control. Based on leading technology from Nessus, Tenable.sc discovers unknown assets and vulnerabilities, and monitors unexpected network changes before they turn into breaches.
Effective risk-based vulnerability management requires a robust process to be assigned directly to these five phases of Cyber Exposure: 1. DETECT 2. EVALUATE 3. ANALYZE 4. REPAIR 5. MEASURE
Security built into DevOps. Protect containers in development and operations.
Tenable.io® Container Security enables easy and secure DevOps processes by providing visibility into container image security, including vulnerabilities, malware, and policy violations, through integration with the build process.
BeyondTrust
PRIVILEGED ACCESS AND SESSION MANAGEMENT
Secure password
Reduce the risk of privileged credential misuse through automatic session and password management Secure, control, monitor, alert and record access to privileged accounts. Continuously discover and accounts on board. Take advantage of powerful threat analysis and reporting to address compliance requirements.
Cloud vault
Provide comprehensive privileged session management and essential hopping capabilities with a cloud-based solution. Secure credentials and access to providers with a single solution.
Secure DevOps Secrets
Implementing a centralized management solution, built for continuous development environments with security, as the driving factor reduces the risk of exposure without slowing down the application delivery process.
ENDPOINT PRIVILEGE MANAGEMENT
Stop attacks by removing excessive privileges on Windows, Mac, Unix, Linux, and network devices.
Root access control
Provide specific elevation of privilege rules to perform only specific tasks or commands.
User Activity Audit – Protects against unauthorized changes to files, scripts and directories
Monitor and Replay – Detect suspicious users, accounts, and asset activity in real time or replaying
The BeyondTrust Privilege Management – For the Unix and Linux implementation was very successful. All access to the server is limited, even via SSH.
SVP / Recovery Systems, CTO, DCI
Outstanding features
Audit and Governance: Analyze user behavior by collecting, storing and indexing logs of keystrokes, session recordings, and other privileged events.
Fine-grained least privilege – Elevate privileges for standard users on Unix and Linux through specific, policy-based controls.
System application remote control – Allow users to execute specific commands and remotely log in according to the rules without logging in as administrator or root.
Dynamic Access Policy – Use factors such as time, day, location, and application / asset vulnerability status to make elevation of privilege decisions.
File and Policy Integrity Monitoring – Audit and report on changes to critical policy, system, application and data files.
Threat reporting and analytics – correlate user behavior with asset vulnerability data and security intelligence from top security solutions. Featured integrations.
Password Management – Combine Privilege Management with your password vault to increase security and obfuscate passwords.
SIEM, like Splunk
Take advantage of the built-in syslog capabilities to send information for each type of event to Splunk or any other SIEM solution.
PuTTy and other terminals
Connect to almost any terminal emulator with a single line of code and access systems with the privileges you have defined. Privileged endpoint management for Unix and Linux has the following main components. First, there is a client installed on a server. This is used to start any kind of elevated commands.
We're Here To Help!
Office
Arango Orillac Bulding. Fl., East 54 th Street, Panama, Panama.
Av. Simon Bolivar No.6
Torre Fabre I Piso 8
Santo Domingo
República Dominicana.
Hours
M-F: 10 am – 4 pm
S-S: Closed
Call Us
+1 (305) 907-8410
+1 (809) 856-0062
+1 (829) 692-8559