Cybersecurity

Anticipating threats and protecting sensitive information systems

Cybersecurity 2017-06-12T16:18:17+00:00

Proven for high defense and security needs, our solutions protect the integrity of your information system and your information assets by:

Detecting the beginnings of cyber attacks and information leaks that weaken your IS

Ensuring the confidentiality and safety of exchanges between networks or systems

Preventing data leakage, whether intentional or accidental

MediaCentric®

CYBER THREAT
INTELLIGENCE PLATFORM

MediaCentric® can detect the early signs of cyber attacks and the leak of sensitive information generating vulnerabilities for the IS.

MediaCentric®, with capacities for collecting and analyzing the surface and deep web, provides activity monitoring on all sources (social networks, forums, pastes, IRCs, etc.) and alerts

more information

CrossinG®

Gateway for securing network interconnections

CrossinG® makes it possible to manage data flows and to ensure the confidentiality and integrity of exchanges between two information systems.

High-level network partitioning and advanced processing of incoming and outgoing data flows prevents the risk of an attack spreading from one network to another and also provides protection against harmful content injection and data leaks.

more information

ISSUES

Breaking the kill chain of a cyber attack

Growing in number, more diversified and more precisely targeted, computer attacks have become commonplace and are becoming more and more sophisticated, to the point that they can now be considered as genuine strategic offensives. Advanced Persistent Threats, or APTs, are characteristic of this new generation of threats, methodically combining several intrusion tools and vectors in order to strike slowly, but surely…

more information

Secure exchanges between SOCs

In ECOSSIAN project, the critical infrastructures and the Security Operations Centers (SOCs) are interconnected across UE and converge towards a pan-European SOC. The aim is to enable real-time exchange of information on vulnerabilities, threats and incidents. The extreme sensitivity of the data thus transmitted calls for maximum security of interconnections…

more information

Contact Cyber Security Team

Contact us