Cyber security may be generalized as the practice of being protected against the criminal or unauthorized use of electronic data and electronic assets, including identifying and mitigating risks from employees, internet gateways, WAN, and LAN, protecting data at-rest or in-transit.
CYBER SECURITY DEFINED
Internet Gateway
Proactively keep your network safe from
viruses, intrusions, botnets, spyware, trojans, worms and other malicious
attacks. Protection from known threats such as viruses, spyware, worms,
trojans, adware, keyloggers, malicious mobile code (MMC) and other dangerous
applications and web content.WAN, LAN, Email, Employees
Real-time scanning of email prior to delivery for malware, viruses, and phishing, in addition to Unifying Endpoint Detection and Response, Risk Analytics, and Hardening technologies at the endpoint multiple layers of advanced techniques are leveraged to successfully stop breaches throughout the entire threat lifecycle, from the first contact, exploit, persistence, and malicious activity, including unintentional vulnerabilities caused by employees.
Protect Data
At-RestEncryption protects data on PCs and enables teams to securely share documents on internal and cloud based file servers
by automatically and transparently encrypting files and folders
based on either manual or centralized policy.Protect Data
In-TransitTransport Layer Security (TLS) provides a secure channel for data transmission, and ensures that all content, emails, and attachments are encrypted during transit. This is known as data-in-motion security because the data is secure during the actual transmission process. Certified recipients accecss secured messages via HTTPS.