Softline offers security management solutions in a virtual environment, solutions for the organization of protected remote access to corporate systems and applications from mobile devices.
Protection of Servers, Endpoints
Traditional protection of workstations and servers is provided by anti-virus software, firewalls, and integrity control tools for servers. When choosing solutions, the need to use in depth, intrusion prevention tools and sandboxes should be taken into account, as well as the difference in antivirus approaches. We offer dedicated solutions for virtual servers and workstations.
Virtual Infrastructure Protection
Virtual servers have the same vulnerabilities as physical hardware. In addition, specific intrusion scenarios can be implemented in their relation. Softline offers security management solutions in a virtual environment that can prevent:
attacks on the hypervisor from the virtual machine;
attacks on the hypervisor from the physical network;
attacks on the drive of virtual machine;
attacks on administration tools of virtual infrastructure;
attacks on the virtual machine from another virtual machine;
attacks on the replication network of virtual machines;
uncontrolled increase in the number of virtual machines.
Mobile Devices Protection
We offer reliable solutions for the organization of protected remote access to corporate systems and applications from mobile devices. We provide secure access to data and systems, protect information and documents stored on devices for enterprise-wide managed devices, as well as for employees' own gadgets, even if a gadget is lost.
A significant part of company information is contained in databases, so DBMS often becomes an object for attacks, for example, attacks of SQL injection type and attempts to unauthorized access.
DBF (DataBaseFirewall) solutions are tool for protecting corporate DBMS, preventing major threats to the accessibility, integrity and confidentiality of data. Specialized firewalls for databases help to identify attacks on the database and attempts to use database access rights for other purposes by tracking and classifying millions of SQL queries, as well as by detecting abnormal behaviour.