SAFE SYSTEMS CG propose des services de hardening pour renforcer la sécurité des systèmes informatiques de nos clients. Nous utilisons une approche globale pour identifier les vulnérabilités et les risques, et nous mettons en place des mesures de sécurité pour protéger les systèmes contre les attaques.
Les services de hardening incluent la mise à jour des systèmes d'exploitation et des logiciels, la configuration des paramètres de sécurité, la mise en place de stratégies de gestion des accès, la détection et la réponse aux incidents, et la mise en place de plans de reprise d'urgence."
Infrastructure, Network & SDN
Hypervisor (Type 1 & 2)
SEL-2740S Software-Defined Network (SDN) Switch
Juniper SRX Services Gateway
Cisco IOS Switch RTR
Riverbed SteelHead CX
WLAN Access Point (Internet Gateway Only Connection)
WLAN Bridge Security Technical Implementation
Infoblox DNS DHCP (Cloud-First Security & Networking | DNS, DHCP ...)
Network Infrastructure Policy Security
Arista MLS (Data Center Switches deliver efficient, reliable, high performance Cloud Network Infrastructure and Architectures on 40GbE - 100GbE)
Virtual Private Network (VPN) Security Requirements
Mainframe Product Security Requirements
Domain Name System (DNS)
Multifunction Device and Network Printers
Authentication, Authorization, and Accounting Services (AAA) Security Requirements
BIND (DNS Server)
HP FlexFabric (Next-generation, highly scalable data center fabric architecture of an HP Converged)
IBM z/VM - highly secure and scalable hypervisor and virtualization technology for cloud infrastructure and for running critical application
FIREWALL, IDS/IPS & ALG
IDS Types - Advanced Security
Network-based IDS NIDS
Host-Based IDS HIDS
Hybride
IPS Types (Honeypot, Network Sniffers, etc..) - Advanced Security
Fortinet Fortigate Firewall
Intrusion Detection and Prevention Systems (IDPS) Security Requirement
Symantec Proxy SG - Symantec Endpoint
TANIUM EDR (Endpoint Detection and Response)
Palo Alto Networks
Windows Firewall
A10 Networks ADC ALG (Application Delivery Controller & Advanced Load Balancer)
CA API Gateway ALG (application-level gateway)
F5 BIG-IP Device Management
Microsoft
Microsoft Active Directory (Forest , Domain)
Microsoft Office (Access - Publisher - Word - Excel - Powerpoint - Office System - Groove)
Microsoft Exchange (Mailbox Server 2013)
Microsoft (SharePoint - OneNote - Outlook - Skype for Business - OneDrive - Visio - Projet - Office 365)
Microsoft IIS 10.0 Site
Windows PAW (Privilegied Access Workstation)
Microsoft DotNet Framework 4.0
Microsoft Internet Explorer 11
Antivirus
McAfee MOVE (Management for Optimized Virtual Environnements ) AV - Agentless
McAfee VSEL (VirusScan Enterprise for Linux)
McAfee VirusScan
McAfee Application and Change Control (MACC)
VMware vRealize Automation (VRA) - FOR end-to-end delivery of IT components
Systems Security
Test & Development ZONE
Traditional Security Checklist
General Purpose Operating System
All Operating Systems (Windows, Unix, Linux, IBM Z/OS, Solaris, Redhat, AIX, Ubuntu, )
Trend Micro Deep (Deep Security Check)
Bromium Secure Platform (Advanced security solution that delivers enterprise protection and visibility with minimal user impact and low resource overhead, isolating host-based threats)
Splunk Enterprise 7
Central Log Server (CLS) Security Requirements
Application Security Testing Services
ERP (SAP, ORACLE EBS, X3, DYNAMICS, JD EDWARDS)
CBS (CORE BANKING SYSTEMS) (Flexcube, Delta BANK, ORION, etc.)
Intelligent Network (HUAWEI, ERICSSON, AMDOCS, Etc.)
Mobile Money Platform (EWP, COMVIVA, etc.)
WEB APP TESTING
MOBILE APP TESTING (Binary Statistic Analysis, Dynamic Code Analysis , Mobile App Penetration Testing)
Database Testing
Database testing provides security audits of databases, with review of the database environment and associated documentation
Oracle Database
Oracle MYSQL
Microsoft SQL Server
IBM DB2
Cassandra
PostGreSQL
EDB Postgres Advanced Server
Crunchy Data (Trusted Open Source PostgreSQL for the Enterprise)
MongoDB Enterprise
MarkLogic Server
Web Servers & Application Servers
Application Server Security Requirements
Web Server Security Requirements
Application Security and Development Security
Apache Server (2.4 Windows Server , 2.2 Site for Windows Security, Tomcat Application Sever)
Oracle HTTP Server ( Apache Based HTTP Server)
JBoss Enterprise Application Platform (EAP)
Oracle WebLogic Server (App Server)
IBM WebSphere (App Server Network Deployment)
Adobe Acrobat Reader DC
ArcGIS Server (SI Géographique)
Google Chrome - Current Windows Security
Container Platform Security Requirement (OpenShift, etc.)
Docker Enterprise 2.x Linux/UNIX
Mobile System Device Management & UEM & IOT
Apple
Android Samsung
Mobile Device Policy Security
Unified Endpoint Management (UEM) Server Security Requirement
NDM (Network Device Management) Security Requirements
Commercial Mobile Device (CMD) Policy Security
BlackBerry Enterprise Mobility Server 2.
MDM (Mobile device management - Device Management System) Server Policy Security Technical Implementation
MobileIron Core (Brings together comprehensive security and Unified Endpoint Management (UEM))
Unified Endpoint Management (UEM)
Jamf Pro (Gestion des mobiles professionnels)
Forescout – Active Defense for the Enterprise of Things
ForeScout CounterACT (Complete Portfolio to Secure Your Enterprise of Things)
AKAMAI KSD (Kona Site Defender) Une solution conçue pour protéger les ressources Web et mobiles des entreprises contre les attaques d'applications )
Voice & Video
Video Services Policy
Voice Video Services Policy
Voice Video Session Management Security Requirements
Voice/Video over Internet Protocol (VVoIP)