THE PILLARS OF GDPR
We have it covered.
Solved.IT has an excellent portfolio of security vendors and can provide customers with solutions that cover six security pillars relevant to GDPR compliancy:
Protecting the perimeter with next generation firewalls: SonicWall
Securing the end point: ESET
Deploying encryption: ESET
Ensuring e-mail security: SonicWall
Facilitating secure remote access: SonicWall, Vasco, Centrify, One Identity
Providing disaster recovery: Unitrends and Storage Craft
Next Generation Firewalls
Don’t just detect breaches, prevent them with SonicWall next-generation firewalls and award winning network security solutions. Stop ransomware, encrypted threats and phishing attacks, over not only wired but also wireless and mobile networks.
Next Generation AV Protection
ESET’s powerful security management console gives you real-time information on the security state of your network, endpoints and mobile devices, including security and administration functionality that protects you against threats.
Simple & Powerful
ESET Data encryption for files on hard drives, portable devices and sent via email, with Simple and powerful encryption for organisations of all sizes allowing you to Safely encrypt hard drives, removable media, files and email meeting FIPS 140-2 Validated 256 bit AES encryption for assured security offering hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy supporting Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT.
SECURE REMOTE ACCESS & SECURE ACCESS
Safe Access Anywhere
SonicWall Secure Mobile Access - Empower your mobile workforce and reduce IT costs with a unifi ed secure access gateway that provides best-in-class SSL VPN, per app VPN, device authorization and single sign-on (SSO). Choose the deployment option that best fits your needs, Centrally manage all your SMA appliances and dynamically allocate user licenses based on real-time demand, mobile connect clients for Google, Windows, Apple, Chrome & Amazon.
Vasco - One time password. More businesses and government agencies today trust VASCO, a world leader in two-factor authentication technologies and systems, to secure access to sensitive data, prevent compromise of critical systems, and demonstrate regulatory compliance.
One Identity - One Identity solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. Our solutions enhance business agility while addressing your IAM challenges with on-premises, cloud and hybrid environments.
Centrify - Minimise your attack surface. Control privileged access to your hybrid enterprise. Validate that users are who they say they are. Deliver cross-platform, risk based, least-privilege access. Control and audit shared access to privileged accounts – both on-premises and in the cloud. Secure the remote access audit all privileged sessions.
Sandbox Zero Day Protection
Select your platform, physical, Virtual or hosted Integrated with multi-engine Capture Advanced Threat Protection service sandbox, Multiple AV engines: SonicWall Capture Labs, McAfee®, Kaspersky™ and Cyren, Confi gurable Sender Policy Framework (SPF), Domain Keys Identifi ed Mail (DKIM) and Domain-based Message Authentication, Reporting & Conformance (DMARC) settings Scans reputation of not only the sender IP but also message subject, content, embedded links and attachments, Available Encryption and Compliance add-on
BACKUP & RECOVERY
Unitrends -Unitrends increases uptime, productivity, and confidence in a world in which IT professionals must do more with less. Our all-in-one backup appliances simplify data protection, application spin-up, and SLA policy automation. Seamless integration with the cloud delivers long-term retention and fast disaster recovery.
Storagecraft - The StorageCraft® Recovery Solution™ gives you tools to back up your systems, applications, and data, replicate them locally or in the cloud, and restore everything from a single fi le to complete systems throughout your network. Physical or virtual, Linux or Windows, you won’t find a faster, more reliable way to recover. Failure is not an option. Recover from any IT Disaster. Backup and Replication with central management supporting Physical, Virtual and Cloud with recovery from and to all.