CG-Solutions Handbook

Preview:

DESCRIPTION

WE have a story for you! An almanac that throws light into the latest in technology and digital security trends and the solutions we bring to the table on this front. Our confluence of niche leading brands in the industry, coupled with our hands-on solution centric expertise, could be pivotal to any enterprise. Hence, we stack our range of solutions in the pages that follow… READ | REASON | RECEIVE | REALIZE

Citation preview

EMAIL ARCHIVING, BACKUP & FAX

FRAUD PREVENTION

ENDPOINT THREAT DETECTION AND RESPONSE

IDENTITY AND ACCESS MANAGEMENT

INTELLIGENT NETWORK SOLUTIONS

INTRUSION PREVENTION SYSTEM

WIRELESS IPS (WIPS)

PRIVILEGED IDENTITY MANAGEMENT

MULTI-FACTOR AUTHENTICATION

SINGLE SIGN ON (SSO)

VULNERABILITY MANAGEMENT

WEB VULNERABILITY SCANNER

FILE INTEGRITY MONITORING & CONFIGURATION MANAGEMENT

WEB APPLICATION PENETRATION TESTING

NETWORK ASSESSMENT

UNIFIED THREAT MANAGEMENT (UTM)

WEB FILTERING AND SECURITY

ENDPOINT ENCRYPTION

EMAIL SECURITY

APPLICATION SECURITY

DATA PROTECTION SOLUTION

APPLICATION DELIVERY CONTROLLERS

3

4

5

6

7

8

9

10

11

12

13

14

ANTIVIRUS

INDOOR & OUTDOOR ACCESS POINTS

OUTDOOR WIRELESS

DATA LEAK PREVENTION

DNS/DHCP AND IPAM

END USER IT ANALYTICS

ENTERPRISE SECURE ACCESS

SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)

WAN OPTIMIZATION

16

17

18

19

20

21

22

23

24

26

25

27

28

29

31

32

ENTERPRISE WLAN 30

15

1

2

INDEX SOLUTIONS HANDBOOK

GO TO INDEX PAGE

GO TO INDEX PAGE