• Home
  • /Security and protection of networks and data



Practice and statistics, particularly devotedly ran in this segment, point out the fact that most unauthorized accesses and breaks into companies’ internal networks cause substantial financial loss, and that the recovery of systems and data alone cost additional investments, as does investment in human resource. Yet, the permanent loss of data or usurpation of confidentiality, fairly commonly, proves irretrievable.

Amber Software has long since been cooperating with the selection of leading equipment vendors in this sensitive IT segment, such as:

–¬†¬†¬†¬†¬†¬† CheckPoint
–¬†¬†¬†¬†¬†¬† Cisco (Iron Port)
–¬†¬†¬†¬†¬†¬† Juniper Networks
–¬†¬†¬†¬†¬†¬† IBM
–¬†¬†¬†¬†¬†¬† RSA

  • 10

    Complete protection of IT infrastructure
    Protection of server and desktop computers
    Protection of corporate e-mail system from malicious traffic
    Dealing with attack in progress/anticipation and prevention of possible intrusion into corporate network
    Centralized control over protection of the system and network
    Blocking access to Webb pages with inappropriate and malicious content

  • Intrusion prevention
    Intrusion detection
    Unified Threat Management (UTM) appliances
    E-mail security
    Data Security
    Desktop protection
    Server protection
    Security management
    Vulnerability management
    Web content filtering


  • tab_security_oprema i sistemiFirewall systems
    IPS/IDS systems
    Content Monitoring/Filtering
    Antivirus on hosts, mail box and GW level
    Spam protection
    Endpoint Security
    SSL VP