Tec Group Berhad
Cybersecurity Solutions
Protects IT infrastructure and data from cyber threats, attacks and unauthorised access.
1
Network Security Solutions
Network security solutions stop cyber threats and attacks from entering or spreading on our customers’ network. Our network security solutions include encryption, hashing and tokenisation of data to protect the data. We also recommend suitable protocols and practices for enterprises to adopt in order to protect their data.
2
Endpoint Protection Platform
Endpoint protection platform protects endpoints such as desktops, laptops and mobile devices on a network or in the cloud from cybersecurity threats.
3
Network Access Control
Network access control enables access management through improving the visibility of users of the network, as well as policy enforcement on devices and users of corporate networks. Its functions include:
-
Mitigation of network threats by enforcing security policies that block, isolate, and repair non-compliant machines without administrator attention;
-
Recognition and profiling of users and their devices before malicious code can cause damage;
-
Management of guest access through a customisable, self-service portal that includes guest registration, guest authentication, guest sponsoring, and a guest management portal; and
-
Evaluation of security-policy compliance by user type, device type, and operating system.
4
Anti-DDoS Protection
Anti-DDoS protection targets DDoS attacks. Anti-DDoS protection mitigates these DDoS attacks by:
-
analysing data packets quickly in real-time to detect an anomaly that indicates a possibility of a DDoS attack;
-
separating and filtering non-legitimate requests from legitimate requests; and
-
analysing emerging internet threats to develop defences for future attacks.
5
Web Isolation
Web isolation contains web browsing activity in an isolated environment to protect computers or endpoints from any cyber threats. In other words, web isolation mitigates cyber threats when users are performing web browsing activities as malware will not infiltrate the users’ devices or any other devices on the network. This web isolation may occur locally on the computer or a server.
6
Application Delivery Controller
A network device used to assist software in directing user traffic, in order to remove the excess load from 2 or more servers. Application delivery controller allows for data compression, connection multiplexing, traffic shaping, application layer security, offload of SSL and TLS, content switching and server load balancing, amongst others.
7
Cloud Security
Cloud security is dedicated to securing cloud computing solutions. This includes maintaining privacy and ensuring data security.