THE KERNEL. Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients.

Similar documents
CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cyber Security Incident Response Fighting Fire with Fire

Security

All-in one security for large and medium-sized businesses.

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

PCI DSS Addressing Cyber-Security Threats. ETCAA June Gabriel Leperlier

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Security for the Cloud Era

Agile Security Solutions

Total Threat Protection. Whitepaper

Training + Information Sharing: Pillars of enhancing cybersecurity posture

Securing Your Microsoft Azure Virtual Networks

Security by Default: Enabling Transformation Through Cyber Resilience

Ingram Micro Cyber Security Portfolio

AKAMAI CLOUD SECURITY SOLUTIONS

Securing Your Amazon Web Services Virtual Networks

Future-ready security for small and mid-size enterprises

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Sage Data Security Services Directory

Simplify Your Network Security with All-In-One Unified Threat Management

Cyber security tips and self-assessment for business

Cybersecurity The Evolving Landscape

Position Title: IT Security Specialist

Securing Today s Mobile Workforce

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Office 365 Integration Guide Software Version 6.7

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

DXC Security Training

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

THE ACCENTURE CYBER DEFENSE SOLUTION

NetDefend Firewall UTM Services

IBM SmartCloud Notes Security

Les joies et les peines de la transformation numérique

Security Vendor Line Card

deep (i) the most advanced solution for managed security services

Are we breached? Deloitte's Cyber Threat Hunting

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

CYBER RESILIENCE & INCIDENT RESPONSE

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Cisco Self Defending Network

May the (IBM) X-Force Be With You

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CyberSecurity: Top 20 Controls

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Understanding the Changing Cybersecurity Problem

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

Integrated Access Management Solutions. Access Televentures

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

align security instill confidence

Verizon Software Defined Perimeter (SDP).

Empower stakeholders with single-pane visibility and insights Enrich firewall security data

CA Security Management

Automating the Top 20 CIS Critical Security Controls

Making each relationship with the client EXTRAORDINARY! Corporate Profile

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Deep Instinct v2.1 Extension for QRadar

The Top 6 WAF Essentials to Achieve Application Security Efficacy

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Spotlight Report. Information Security. Presented by. Group Partner

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Must Have Items for Your Cybersecurity or IT Budget in 2018

Building Resilience in a Digital Enterprise

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

Security Landscape Thorsten Stoeterau Security Systems Engineer - Barracuda Networks

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Cyber Security: It s all about TRUST

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Tips for Passing an Audit or Assessment

Position Description IT Auditor

ISACA Enterprise. Solutions and Resources

Information Technology

IT Division Profile. Emirates National Construction & Projects Management Establishment

Security+ SY0-501 Study Guide Table of Contents

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Accessing CharityMaster data from another location

Cybersecurity Auditing in an Unsecure World

Ransomware A case study of the impact, recovery and remediation events

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Cyber Resilience. Think18. Felicity March IBM Corporation

Transcription:

THE KERNEL Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients. Since our founding in 1986, and establishing The Kernel s UAE office in 2008, our company has compiled a lengthy track record of accomplishments. Starting as a hardware business, we soon switched on to software development and have been providing high quality products and services to local and international clients. Our product line, together with strategic partnerships with worldwide companies, in addition to our qualified team in Russia, enables us to deliver stable results in a timely manner. We started our IT projects in Russia and Singapore since 1986, and in 1987 we established our company in Ukraine, then in 1990 in Russia. Our reputation was built through the successful projects we implemented for public and private sectors in these countries. After many years of stable performance we are now, with our partners, a highly-trusted company in Russia, Ukraine, and finally in UAE.

OUR PRODUCTS WEB CONVOY WAF (WEB APPLICATION FIREWALL Intelligent Protection WebConvoy protects against diverse malicious attacks targeting modern web application. This includes common attacks such as SQL injection, XSS (Cross-site Scripting), CSRF (Cross-site Request Forgery), timing attacks, profiling attacks. In addition, WebConvoy protects against targeted and multi-vector attacks on your web application. Application Profiles and Support WebConvoy ships with ready-made profiles for popular web applications (such as WordPress, Drupal, SugarCRM and others). It is also fully-customizable according to your business needs. It s capable of profiling and understanding your application s business logic in both traditional and reactive/rest-based applications.

WEBPURIFIER UTM (UNIFIED THREAT MANAGEMENT) Webpurifier UTM provides firewall, intrusion detection, antimalware, spam and content filtering, and VPN capabilities in one integrated package that can be installed and updated easily. For corporate use it also includes some advanced features such as identity-based access control, load balancing, quality of service (QoS), intrusion prevention, SSL inspection, and application awareness. Webpurifier UTM combines multiple security features into a single platform to protect your network, web, email, applications, and users against attacks, viruses, Trojans, spyware and spam. Sophisticated Entensys technologies such as Deep Content Inspection (DCI) allow you to intelligently manage traffic, control internet applications, and fight advanced, persistent threats. Webpurifier UTM is one of the fastest, most reliable, most agile gateway security products in the industry. Webpurifier UTM works as a web security gateway. It is used as hardware appliance or it can be installed on any virtual server machine. Webpurifier UTM provides many security features and is able to easily add new network defense capabilities through security subscriptions.

PARTNERS PRODUCTS YUBIKEY MULTI-FACTOR AUTHENTICATION What is Yubikey? YubiKey is a small device that you register with a service or site that supports two-factor authentication. Twofactor authentication means that each time you log in, the service will request proof that you have your YubiKey in addition to your regular username and password. Phishing, malware, and other attack methods don t work because they would need both your physical key and your passwords to breach your accounts. Why do I need it? Two-factor authentication with a YubiKey makes your login secure and keeps your information private. The YubiKey requires nothing more than a simple tap or touch. There are no drivers or special software needed. You can use your YubiKey on multiple computers and mobile devices, and one key supports any number of your accounts. YubiKeys are nearly indestructible just add it to your keychain along with your house and car keys.

ELCOMSOFT RECOVERY AND ANALYSIS SUITE Intelligent Protection ElcomSoft has pioneered many software innovations that have made it easier to recover lost passwords from the operating system, Microsoft Office products, Adobe PDF files, ZIP and RAR archives, and a variety of other applications. The latest development revolutionizes the speed of password recovery without requiring expensive hardware. Certain ElcomSoft password recovery applications employ a revolutionary, patented technology to accelerate password recovery when a compatible NVIDIA graphics card is present in addition to the CPU-only mode. Currently supporting all GPGPU-capable NVIDIA and AMD boards, the GPU acceleration technology offloads parts of computational-heavy processing onto the fast and highly scalable processors featured in the NVIDIA s latest graphic accelerators.

PARTNERS PRODUCTS OXYGEN FORENSICS TOOLKIT Oxygen Forensics is a market-leader in mobile forensics and analysis. The flagship product is capable of rooting and extracting information from over 330 mobile makes, including Android, ios, BlackBerry and Windows phones. Data Extraction Oxygen Forensics can extract data from encrypted backups including BlackBerry backups, itunes backups, and Android physical images. The data recovered includes passwords, messages, phonebook, web browsing history, and files. Cloud Data Extraction Oxygen Forensic Detective acquires data from more than 20 cloud storages: icloud contacts and calendar, Google Drive, Google Location History, Live contacts and calendar, OneDrive, Dropbox and Box as well as from a wide range of social media including Twitter and Instagram.

OUR SERVICES Many organizations already have firewalls and intrusion detection systems that can inspect web traffic and respond to simple and well-known types of attacks, but these tools are not suitable to protect the in-house developed web applications. Assess Verify Protect Training Comprehensive security auditing and reporting Our Verify service allows your organization to Our Protect service provides a complete Focused on cybersecurity in software, service. Our team performs a comprehensive discover potential weaknesses and possible security solution design and consultation for networks, and social engineering. external and internal white hat audit and exploits that can be used by a malicious your organization. report findings attacker.

OUR TRAINING COURSES Exclusive Training Programs Practical cybersecurity training programs developed in collaboration with The Kernel and SmartWorld. These programs and courses focus on bringing security awareness to organizations, and introducing practical know-how in network security, forensics and people-training. Our current lineup of programs includes: Cybersecurity Awareness Cybersecurity 101 Forensic Investigation Network Security (Wired / Wireless) Social Security and People Training Web Security Threats & Protection Mitigation: Designing, implementing and monitoring secure systems International Certification Programs Our training center offers international certifications for ISC2 and ISACA. These certifications are key to advancing your organization s security experience and staff qualification. ISC2 Certifications CISSP Certified Information Systems Security Professional CCFP Certified Cyber Forensics Professional CCSP Certified Cloud Security Professional SSCP Systems Security Certified Practitioner ISACA Certifications CISM Certified Information Systems Manager CISA Certified Information Systems Auditor CGEIT Certified in the Governance of Enterprise IT CRISC Certified in Risk and Information Systems Control

hello@thekernel.com www.thekernel.com P: +971 4 7017 260/1, P.O. Box 54808, DAFZA 6EA,#209, Dubai, United Arab Emirates hello@thekernel.ru www.thekernel.ru P: +7 495 2318224 Смоленская площадь, дом 3, офис 49. Москва 121099. РФ