Software for auditing IT-Infrastructure with the objective to improve the technical security settings in the existing environment.
IT Security Check
Product & Cloud Service: product
integrio controls complex data flows - from integration to analysis. Integrio checks all the data format, sequence and quality and ensures a smooth and uninterrupted transfer. A must for efficient fees and management processes.
Business Process Management / Workflow,
netsense Gravity is an innovative vulnerability management system. This user-friendly web application is scanning your internet-facing servers for security issues on a regular basis and helps you and your team to close new issues on time.
ab Fr. 100.-/Mt, je nach benötigter Computing-Ressourcen
Infrastructure-as-a-Service (IaaS) means you don’t have to buy server capacity in advance, but can instead lease it flexibly and according to your needs. We maintain your servers in a public cloud or in your private cloud and take care of system administration.
FraudGuardian enables financial institutions to address fraud challenges (e.g. mobile banking, payment fraud, e-banking, account takeover, identity theft) with out-of-the-box controls packaged in bundles. These controls ensure continuous auditing of human behavior across channels, IT layers and financial transactions.
FraudGuardian is backed by NG|Screener, an innovative enterprise software platform that uses Big Data technology, predictive analytics, and user behavior analytics to combine and standardize data from across the entire banking system. FraudGuardian prevents fraud before it happens. Its real-time auditing interface allows you to easily view all detected activities anytime.
General Business Analytics,
GPACT provides cyber intelligence to companies operating in strategic sectors such as finance, telecommunication and energy, as well as to various government agencies including security and intelligence bodies, with an easily understandable and flexible structure.
Feeds provided via GPACT platform:
Stolen Credit Card
Money Laundering Methods
Compromised Cooperate Credentials
Phishing Detection and Termination
Sector-Specific Cybercrime Reports
VIP Social Media Protection
IT Security Check