SOLUTIONS

Our solution portfolio comprises of top market leader technologies focused on proactive and in-line protection for safeguarding end users, critical data, network infrastructure, and outside perimeter content for mid-market and enterprise organizations to offer the best way to measure value of IT investment and protection.

 

Cloud:

• Manage Identity, Mobility, and end-use Secure Access to Cloud and mobile apps with single sign-on

• Mac Management

• User Provisioning and Multi-Factor Authentication

• Cloud App User Provisioning

• Secure Access to Enterprise Social Media and Shared Accounts

• Identity-as-a-Service (IDaaS) for Cloud App SSO and Security

• Cloud-based Integrated Security for Windows, Macs and mobile devices

• Virtual Replication & Disaster Recovery for Public and Virtual Clouds

• Disaster Recovery as a Service (DRaaS)

• Productivity Solutions (Office365 & Cloud Services)

 

 

Data Center:

• Unified Identity Management Across Windows, Linux and UNIX Systems

• Active Directory Bridge to manage identities for Cross-platform Systems in Active Directory

• Identity Consolidation and privilege Management for Windows, Linux and UNIX

• Monitoring and Reporting of Privileged Sessions with compliance reporting

• Identity Management and Auditing

• Privileged Access Security & Management

• Windows Server Protection

• Manage Third-Party Access to Corporate Systems

• Big Data Security

• Server Isolation Cross-Platform Systems

• Business Continuity & Disaster Recovery for Virtualized IT infrastructure

• Data Replication for Virtualized World

 

 

Mobile/End-User:

• Integrating Macs Securely into the Enterprise

• Empowering the Mobile Worker (BYOD)

• Mobile Control & Management (MDM)

• Mobile Encryption

• Mobile Security

• Single sign-on to all systems allowed

• Identity & Access Control/Management

• Endpoint Disk Encryption

• Application & Device Control

• Web Control Filtering & Protection

• Client Firewall & Host Intrusion Protection System (HIPS)

 

 

 

Data Protection:

• Endpoint Protection

• Full Disk Encryption

• Data Loss Prevention (DLP)

• Data Leakage Auditing

• Sensitive Data Discovery & Reporting

• File Shares Encryption

• Content Filtering

• eMail Encryption

• Manage Native Device Encryption

• Encryption for Removable Media

• Encryption for Cloud Storage

 

 

 

 

Web Infrastructure & Web Content:

• Next Generation CDN (Content Delivery Network)

• Web Content Optimization & Performance

• Web Security (In-Line) – Advanced Distributed Denial of Service Protection & Mitigation

• Web Threats Monitor and Control

• Web Content Availability 100% Assurance

• Authoritative DNS service

• Keyless SSL

• Web Application Firewall

• Web Server Vulnerabilities

• Web Malware Detection & Automatic Clean up

• Black List & Reputation Monitoring and Alerts

• Web Server Protection

 

 

 

 

 

Network

• Unified Threat Management Solution (UTM)

• Network Protection

• Wan Optimization

• Next-Gen Firewall

• Virtual Private Network (VPN)

• Intrusion Prevention System (IPS)

• Wireless Protection

• Web Server Security & Vulnerability Assessment

• Web Gateway Protection

• eMail Gateway Protection

• Network Access Control

• Server Protection

• Network Storage Antivirus

• SharePoint Security

• Virtualization Real-time Threat Protection

 

 

 

 

 

 

Regulatory, Norms, and Local Federal Laws Compliance

 

 

 

 

 

 

PCS DSS

 

Sarbanes Oxley

 

FISMA

 

FERC NERC

 

PLFPDPPP - Ley Federal De Protección De Datos Personales En Posesión De Los Particulares - México

 

Ley Estatutaria de Protección de Datos Personales - Colombia

 

Ley de Protección de Datos Personales - Perú

 

Ley de Protección de Datos Personales - Argentina

 

Ley Sobre Protección de La Vida Privada O Protección De Datos De Carácter Personal - Chile

 

Ley Orgánica de Protección de Datos de Carácter Personal - España

 

About Onistec

 

© 2011 - 2015 Onistec, llc. All rights reserved