close

Endpoint Security Mac Download

Company Name: Barricades Internet Security Information Trade Co., Ltd. Sti. Web Address: Interests: Client security, network security, application security, log management, secure network design, IT risk management, security testing, compatibility services (27001 and CobiT), Security measurement and monitoring, security configuration, control, and optimization, IT Security training services ..

Company Name: White Computer Consulting Services Web Site: Interests: Secure Network and System Design, firewall / UTM / AV / VPN / WF positioning and management, Network / Applications / Wireless / Web Penetration Testing, Network / Firewall / Unix training, Firewall integrated special radial solutions, 5651 solutions, Application Security, endpoint Security solutions, virtualization solutions. (Citrix / Faronics / Fortinet / SonicWALL / DrayTek / Zyxel partners)

Company Name: HP Information Security Training and Consulting Ltd. STI (Information Security ACADEMY) Web Address: Interests: Security audit and testing services (source code analysis, web application pentest, mobile system and application pentest cloud infrastructure pentest, wireless pentest, network pentest, DDoS pentest, Firewall / IPS pentest, VoIP pentest) establishment of DDoS Defense infrastructure, PCI DSS pre-audit and consulting, ISO 27001 ISMS setup, secure software development processes, WAF / IPS infrastructure setup and management -Managed services-, 5651 law to meet the requirements, forensics analysis, cyber crime analysis , CSIRT installation, incident response, secure SCADA infrastructure design and safety testing, malware analysis, customized DPI solutions.

Company Name: Endersys IT a.ş.web Address: Interests:

Consultancies (IPS, firewalls, WAFER, APT, ISO 27001, Penetration Testing, Security Assessments, PCI DSS Compliance, Vulnerability Management, Network Anomaly Analysis, Mobile Application Security Testing, Cloud Security Testing, Application Security Testing, Web Application Security Testing, Unix / Linux Seals (RHEL, OEL and SLES), DOS / DDOS Testing, Anti-Spam Gateway, Oracle Golden Gate, Oracle Exadata, Malware Detection, Linux System Administration (RHEL, OEL and SLES))

Training (ISO 27001, PCI DSS, Secure Application Development, Leak Testing Techniques, Network Security Techniques, Linux System Administration (RHEL, SLES, and OEL), Oracle Golden Gate, Oracle Exadata)

Company Name: Nebula Information Systems Co.Ltd. Web Address: Interests: network security, system security, data security, application security, identity management, mobile security, security management, security management services, security auditing services

Company Name: NGN Information and Communication Services Web Address: Interests: compliance services against Regulations (HIPPA, JCI, COBIT, Basel II, ITIL) Risk Management and Aperture tests, log management (solutions to enable compliance with the 5651 law), network security (firewall UTM, AV, VPN, NAC), Web access Security (SSL VPN, URL filtering, IPS, SSL Inspection, Antivirüss, Antispam, Content filtering, Web Application Firewall), SSO (token and token technology)

Company Name: Prolink Representation Domestic and Foreign Trade. Co.Ltd is a Web Address: Interests: networking, data storage, backup and security products to the enterprise sector of end to end solutions to the corporate firewall, network access control, SSL VPN, Tokens and Token Management Software, network management systems, integrated network infrastructure services,

Company Name: Secrov to for information security Software Consulting and Technology Services Ltd. STI. Web: Interests: ISO 27001, COBIT, PCI-DSS consulting and auditing. Vulnerability Analysis and extra virgin tests, DoS / DDoS tests. For information security awareness training, ISMS setup. that carried out in the eyes of the security vendors that gercir Bank. Unix / Linux security controls. Log management, computer forensics services.

Company Name: sectea Website: Interests: ISO 27001, Cobit, ITIL, PCI-DSS process consulting, auditing and documentation works, Vulnerability Analysis and Sizma tests, for information security awareness training, depending on the completion of ISMS creating and process, Risk Analysis, risk Evaluation, by means of solution Void analysis and consulting services. "

Company Name: signalsec Information Security Consulting and Technology Services Software Trade. Ltd. STI Web Address: www.signalsec.co My Interests: Penetration Testing, SCADA Security, Application Security Testing (Dynamic / Static), Vulnerability and Exploit Intelligence (Vulnerability Intelligence), ARM / x86 Binary Analysis, Information Security Training, Mobile Security, Mobile Forensic Analysis, Malware

Company Name: SYMTURK Computer Systems Consulting Governance and Trade. Ltd. Sti. Web address: Interests: Position Critical Systems / Infrastructure Design and Testing, System / Network / Applications / Wireless / Web Application Penetration Testing, Application Static and Dynamic Source Code Analysis (Application Code Review), Software Development Lifecycle Review, Application Design Assessment Real Time Freight and DDOS (Denial of Service) Readiness Tests, 5651 Compatible Event and Log Management Systems, Symantec Product Consulting, HP Fortify Consulting, Application Security, Endpoint Security, NAC (Network access Control) Solutions, DLP (Data Leakage Controls ) Solution, Data Protection Services, High Availability System Design, Backup Solutions, Data Center Storage System Solutions, Information Security Awareness Training, Business Continuity Management (BS25999 and ISO 27031) Consultancy, Safety Standards Consulting (ISO 27001, PCI)

Company Name: TerraMedusa Secure Web Address: Interests: Proactive monitoring of information security and support services.

Company Name: Turco Website: Interests: Networking and security services

Company Name: 3myazıl Web Address: www.3myazilim.co My Interests: Business Continuity Management System and Risk Management Information Systems in the field of consulting and software provides technical support for both.

Be Sociable, Share!
Related posts:

endpoint security definition download     endpoint security client

TAGS

CATEGORIES