Products

DISCOVER OUR SOLUTIONS

McAfee

FILE INTEGRITY MONITORING

McAfee Integrity Monitoring for Data

Cost-effective database solution to assess and monitor the security of base systems

McAfee Integrity Monitoring for Databases tests systems for common configuration vulnerabilities, monitors changes to such configuration, and helps you create a custom security policy to access your sensitive data, providing visibility into potentially configuration changes. hazardous and making it easier to demonstrate compliance.

Centralized checks of database configuration settings – McAfee Integrity Monitoring for Databases is an easy-to-install solution for assessing the security status of the most popular database platforms (Oracle, Microsoft SQL Server, IBM DB2, and MySQL) in an enterprise, including version and patch level, audit settings, configuration parameters, and privileges.

Better visibility into the security level of databases – By assessing and monitoring database configuration settings and access to sensitive data, organizations can demonstrate regulatory compliance and minimize probability of a data breach.

DLP HOST/ NETWORK

MCAFEE INTEGRITY MONITORING FOR DATA

McAfee Host Data Loss Prevention offers unmatched protection against theft and accidental disclosure of sensitive data. This protection affects all networks, applications and removable storage devices.

  • Data Transfer Methodology: Controls how your business transfers data across networks, applications, and removable storage devices.
    Data protection in any format: even if it has been modified, copied, pasted, compressed or encrypted.
  • Data protection in any format: even if they have been modified, copied, pasted, compressed or encrypted.
  • Control of data transferred to removable storage devices, like USB sticks, iPods and other removable storage devices and end data loss through endpoints.
  • Data encryption simplification: Host Data Loss Prevention with Endpoint Encryption increases efficiency in content-aware encryption.
  • Centralized administration console: Define and manage data protection policies, install and update agents, monitor events in real time, and report compliance with regulatory compliance requirements, all from the centralized McAfee ePolicy Orchestrator (ePO) management console.
Microsoft

PRODUCTS

OFFICE 365 BUSINESS

Best for businesses that need Office applications, plus cloud file storage and sharing on PC, Mac, or cell phone. Business-class email not included.

  • Apps Office included
  • MicrosoftOutlook
  • MicrosoftWord
  • MicrosoftExcel
  • MicrosoftPowerPoint
  • MicrosoftAccess (PC VERSION)
  • MicrosoftOneDrive
RSA

THREAT DETECTION AND RESPONSE

RSA creates a wide range of industry-leading products that enable clients to take control of risk.

RSA NETWITNESS – DETECTION AND ADVANCED RESPONSE TO THREATS

Triple the impact of your security team with RSA NetWitness® Platform, our industry-leading threat detection and response platform. Leverage cyber threat intelligence, packages, endpoints and logs, plus machine learning and security analytics technologies, to accelerate detection of the most advanced and evasive threats, discover the full scope of a compromise, and help to automate incident response.

  • Advanced threat protection
  • Endpoint threat detection and response
  • Orchestration and security automation
  • Malware detection
  • Network detection and response
  • User and entity behavior analysis (UEBA)
  • SIEM & Beyond

    IDENTITY AND ACCESS MANAGEMENT

    Accelerate your business and minimize identity risk while providing convenient and secure access to your extended business. RSA SecurID® Suite is a comprehensive identity and access management solution that offers capabilities for authentication, access management, risk analysis, identity management, and user lifecycle management, and supports local and cloud-based systems.

  • Multi-factor authentication and identity assurance
  • Identity governance and RSA® lifecycle management
Check Point

DLP HOST / NETWORK

Check Point – End Points security.

Endpoint security agent that includes all the characteristics and functions necessary for a real and efficient security. It is not necessary to spend as much time and resources in testing, configuration and implementation of a security solution. This agent combines the best firewall, network access control (NAC), program control, anti-virus, anti-spyware, full hard drive encryption, media encryption, with port protection and remote access, all in one agent.

The new version – R72 features

  • Federation of Servers:It offers better updating of clients and optimization of band consumption.
  • WebCheck: Virtualization of web browsing, protection against and malicious sites.
  • OneCheck: Unification of system authentications, a simpler experience for the user.
  • Endpoint Connect: Use of the most simplified and optimized VPN client.
    The suite includes:
  • Endpoint Security Management
  • Check Point Policy Management
  • Endpoint Security Products
Vmware

DATA CENTER PLATFORM DEFINED BY SOFTWARE

Build your software-defined digital foundation with industry-leading technologies.

VMWARE CLOUD FUNDACIÓN

Integrated cloud infrastructure and management services for public and private clouds.

 

VMWARE CLOUD ON DELL EMC

Beta program to provide perimeter and data center infrastructure as a service.

 

CLOUD INFRASTRUCTURE AND DATA CENTER

Transform your IT architecture easily with cloud infrastructure for virtual data centers.

 

VSPHERE

Efficient and secure computing platform for the hybrid cloud.

 

VSPHERE INTEGRATED CONTAINERS

Container business infrastructure for traditional and container hoisted applications.

Hitachi

INFORMATION SYSTEMS AND TELECOMMUNICATIONS. SOLUTIONS AND SERVICES

CONSULTANCY

Hitachi offers business consulting services to help clients establish business strategies, improve operational processes, and create IT strategies. Hitachi also offers IT consulting services to help customers install and operate state-of-the-art IT.

 

IT / COLLABORATION STRATEGIES

Hitachi offers a wide range of key solutions for corporate IT strategies. These include the use of big data through the Data Analytics Meister service that uses a wide range of cutting-edge technology, as well as cloud solutions consisting of hardware with high reliability, usability and expandability. Other strategies include thin client solutions that support work style reforms and ERP that serves as the foundation for improving operational efficiency and optimizing overall management.

 

INDUSTRIES

Hitachi offers a variety of custom solutions and packaged software to support professional operations in industries such as finance, manufacturing, distribution, wholesale and retail, government (national and local governments, as well as public institutions), education and medicine. . Hitachi provides services that improve operations and make them smarter.

 

IT PLATFORM / INFORMATION SECURITY

It offers a wide range of IT platform solutions, including scalable storage solutions that can be adjusted based on purpose and usage, and network solutions that accelerate business through highly reliable network systems. In addition, it offers security solutions to build secure information systems through the use of biometric platforms that include finger vein authentication, encryption solution and other security-related technologies.

 

Globalscape

EFT ARCUS

EFT Arcus is a SaaS MFT solution for organizations seeking the agility, elasticity, and cost savings that the cloud provides. Reduce the complexity of your file transfer infrastructure, increase operational efficiency, and protect your critical data using our secure managed file transfer cloud service. With our MFT cloud service you can:

  • Automate the exchange of data between people and systems
  • Gain visibility into data movement
  • Replace legacy or local file sharing systems
  • Share files securely internally or externally
  • Facilitate compliance with regulations such as SOX, FIPS, HIPAA, CCPA, PCI DSS and others

    EFT PLATFORM

    POWERFUL MFT SOLUTIONS

    Secure and manage your data transfers with ease.

    Global Cape’s Enhanced File Transfer Platform (EFT) is comprehensive and easy-to-use Managed File Transfer (MFT) software. It is available in the cloud / SaaS (EFT Arcus) and in local EFT implementations. Our local options are EFT Enterprise and EFT Express.

    Features of EFT include:

  • Built-in regulatory compliance control
  • Visibility, auditing and reports
  • Scripting-free workflow automation and folder monitoring.
  • Two-factor authentication
  • High availability deployment options
  • Data encryption at rest and in transit
  • Single sign-on
  • EFT Enterprise

 

Kaspersky

INTERNET SECURITY

Stay safe, no matter what you do at work and at home. For anything you do online, whether it’s on your PC, Mac, or Android devices, our one-license suite of advanced security apps protects you from malware, spy webcams, financial scams, and more.

  • Block viruses, attacks, cryptolockers, and much more
  • Prevents online tracking to collect your data
  • Detect hidden spyware on your Android device
  • Protect payments, thanks to bank-type encryption
  • Block unauthorized access to your webcam
  • Encrypt the data you send and receive online, on the VPN
Tenable

IMANAGEMENT OF VULNERABILITIES, IN YOUR OWN FACILITIES

With Tenable.sc you get a complete picture of your network while keeping your data under control. Based on leading technology from Nessus, Tenable.sc discovers unknown assets and vulnerabilities, and monitors unexpected network changes before they turn into breaches.

Effective risk-based vulnerability management requires a robust process to be assigned directly to these five phases of Cyber Exposure: 1. DETECT 2. EVALUATE 3. ANALYZE 4. REPAIR 5. MEASURE

Security built into DevOps. Protect containers in development and operations.

Tenable.io® Container Security enables easy and secure DevOps processes by providing visibility into container image security, including vulnerabilities, malware, and policy violations, through integration with the build process.

BeyondTrust

PRIVILEGED ACCESS AND SESSION MANAGEMENT

Secure password

Reduce the risk of privileged credential misuse through automatic session and password management Secure, control, monitor, alert and record access to privileged accounts. Continuously discover and accounts on board. Take advantage of powerful threat analysis and reporting to address compliance requirements.

Cloud vault

Provide comprehensive privileged session management and essential hopping capabilities with a cloud-based solution. Secure credentials and access to providers with a single solution.

Secure DevOps Secrets

Implementing a centralized management solution, built for continuous development environments with security, as the driving factor reduces the risk of exposure without slowing down the application delivery process.

ENDPOINT PRIVILEGE MANAGEMENT

Stop attacks by removing excessive privileges on Windows, Mac, Unix, Linux, and network devices.

Root access control

Provide specific elevation of privilege rules to perform only specific tasks or commands.

User Activity Audit – Protects against unauthorized changes to files, scripts and directories

Monitor and Replay – Detect suspicious users, accounts, and asset activity in real time or replaying

The BeyondTrust Privilege Management – For the Unix and Linux implementation was very successful. All access to the server is limited, even via SSH.

SVP / Recovery Systems, CTO, DCI

Outstanding features

Audit and Governance: Analyze user behavior by collecting, storing and indexing logs of keystrokes, session recordings, and other privileged events.

Fine-grained least privilege – Elevate privileges for standard users on Unix and Linux through specific, policy-based controls.

System application remote control – Allow users to execute specific commands and remotely log in according to the rules without logging in as administrator or root.

Dynamic Access Policy – Use factors such as time, day, location, and application / asset vulnerability status to make elevation of privilege decisions.

File and Policy Integrity Monitoring – Audit and report on changes to critical policy, system, application and data files.

Threat reporting and analytics – correlate user behavior with asset vulnerability data and security intelligence from top security solutions. Featured integrations.

Password Management – Combine Privilege Management with your password vault to increase security and obfuscate passwords.

SIEM, like Splunk

Take advantage of the built-in syslog capabilities to send information for each type of event to Splunk or any other SIEM solution.

PuTTy and other terminals

Connect to almost any terminal emulator with a single line of code and access systems with the privileges you have defined. Privileged endpoint management for Unix and Linux has the following main components. First, there is a client installed on a server. This is used to start any kind of elevated commands.

We're Here To Help!

5 + 5 =

Office

Arango Orillac Bulding. Fl., East 54 th Street, Panama, Panama.

Av. Simon Bolivar No.6
Torre Fabre I  Piso 8
Santo Domingo
República Dominicana.

Hours

M-F: 10 am – 4 pm
S-S: Closed

Call Us

+1 (305) 907-8410

+1 (809) 856-0062

+1 (829) 692-8559