cg-solutions handbook
DESCRIPTION
WE have a story for you! An almanac that throws light into the latest in technology and digital security trends and the solutions we bring to the table on this front. Our confluence of niche leading brands in the industry, coupled with our hands-on solution centric expertise, could be pivotal to any enterprise. Hence, we stack our range of solutions in the pages that follow… READ | REASON | RECEIVE | REALIZETRANSCRIPT
EMAIL ARCHIVING, BACKUP & FAX
FRAUD PREVENTION
ENDPOINT THREAT DETECTION AND RESPONSE
IDENTITY AND ACCESS MANAGEMENT
INTELLIGENT NETWORK SOLUTIONS
INTRUSION PREVENTION SYSTEM
WIRELESS IPS (WIPS)
PRIVILEGED IDENTITY MANAGEMENT
MULTI-FACTOR AUTHENTICATION
SINGLE SIGN ON (SSO)
VULNERABILITY MANAGEMENT
WEB VULNERABILITY SCANNER
FILE INTEGRITY MONITORING & CONFIGURATION MANAGEMENT
WEB APPLICATION PENETRATION TESTING
NETWORK ASSESSMENT
UNIFIED THREAT MANAGEMENT (UTM)
WEB FILTERING AND SECURITY
ENDPOINT ENCRYPTION
EMAIL SECURITY
APPLICATION SECURITY
DATA PROTECTION SOLUTION
APPLICATION DELIVERY CONTROLLERS
3
4
5
6
7
8
9
10
11
12
13
14
ANTIVIRUS
INDOOR & OUTDOOR ACCESS POINTS
OUTDOOR WIRELESS
DATA LEAK PREVENTION
DNS/DHCP AND IPAM
END USER IT ANALYTICS
ENTERPRISE SECURE ACCESS
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
WAN OPTIMIZATION
16
17
18
19
20
21
22
23
24
26
25
27
28
29
31
32
ENTERPRISE WLAN 30
15
1
2
INDEX SOLUTIONS HANDBOOK
GO TO INDEX PAGE
GO TO INDEX PAGE