
Electronic data must be protected according to these 4 principles :
We cover a wide range of IT security technologies, such as :
Perimeter security : firewalls, IPSEC VPN gateways
Endpoint protection
Intusion Prevention Systems (IPS)
Antispam solutions (using DKIM, SPF, etc.)
Virtualization and hyperconvergence
Security Information and Event Management (SIEM)
Access control to personal devices (BYOD)
Wireless access management
System and application load balancing
IP address management (IPAM) and IPv6 migration
WAN optimization
Management and protection of DNS services (DNSSEC)
Security audit, risk assessment and management
Web and Wifi pentest in black box, gray box or white box