top of page

Product group Safety, risks and management

 

Identity and access management - a guide for those who have access to what and how they can use it

NetIQ solution

  • Adaptive regulation of identification

  • Identity lifecycle management

  • Synchronization and coordination of identities

  • Centralized role management

  • End-to-end authentication

  • Flexible multifactor authentication methods

  • User self-service portal

  • Management of privileged identities

  • Monitoring file integrity, configuration and changes

 

 

Endpoint Security - Management and security of all endpoints and IT assets

ZENworks solution

  • Life cycle management

  • Patches and containerization

  • Application virtualization

  • Management of mobile devices and servers

  • Secure USB devices and disconnect devices

  • Firewall security

  • Advanced port security

  • Wireless security

 

Application security - application security through seamless integration at all stages of the software life cycle

Fortify solution

  • Application Security as a Service

  • Static application security testing

  • Dynamic application security testing

  • Continuous monitoring of applications

  • Self-protection of applications at execution

 

Security operations - detection of known and unknown threats through correlation and real-time analytics, integration of existing customer cybersecurity tools to create a single window of visibility and response

ArcSight platform

  • Real-time detection

  • Workflow automation

  • Absorption of open data

  • Hunting and investigation

  • User behavior analytics

 

Data regulation and protection - data security from data generation to disposal with confidentiality and regulatory compliance

Secure Content Management Solutions (ControlPoint, Structured Data Manager, and Content Manager)

  • Data detection and classification, data management

  • Disposal of applications and data

  • Policy-based regulation

  • Compliance with regulatory and legal requirements

Voltage Solutions (SecureData, SecureMail)

  • De-identification of data (encryption and tokenization)

  • Key management

  • Message security

bottom of page