For many companies electronic security has become one of their primary concerns. We offer a comprehensive set of security services to fortress your IT infrastructure. Our information security management suite consists of the following tools:
Compilance & risk assessment (IT security audit)
Information Security Management System (ISMS) provides integration of all protective and organizational measures into a single managed operation that responds to real threats in real time and secures all your information throughout the enterprise.
Within the ISMS structure we provide the following services:
PCI DSS ver.3
To ensure an adequate security level when processing cardholders' data, and in order to comply with regulatory requirements of payment systems, we offer comprehensive services to bring your infrastructure in compliance with the PCI DSS requirements. Consistent implementation of all PCI DSS procedures and create an environment most likely to provide receipt of a certificate of compliance.
We perform the following work:
DLP (Data Loss Prevention)
DLPs are systems that prevent the disclosure of confidential information to anyone outside the company through any channels. DLP solutions prevent unauthorized use (copying, changing, etc.) and movement (shipment, transfer outside the organization, re-saving in other directory, etc.) of confidential information through controlling emails, FTP connections, ICQ, MSN, AOL, documents printing onto a printer, USB, CD / DVD, Bluetooth, WiFi, etc.
We use products of leading vendors: Symantec, WebSence, McAfee.
Implementation of a comprehensive corporate antivirus system ensures:
We use products of leading vendors: Trend Micro, Symantec, McAfee, Kaspersky Lab, ESET
IPS (Intrusion Prevention System)
The Corporate Intrusion Prevention System monitors and reports on all data streams entering your corporate network, and takes a proactive approach to block any potential hazards. It hardens your company against any hostile influences. The Corporate Intrusion Prevention System is a component of the company security suite and is a scalable, flexible, cost-effective, and comprehensive solution of fortressing your company in the e-business world.
We use products of leading vendors: Cisco IBM Proventia, Stone Soft
IDM (Identity Management)
The Corporate Identity Authentication System provides hardware-controlled authentication of users with access to sensitive information. It uses tokens - small devices in the form of USB- pendants and smart cards to control access. Tokens can be used for storage of multi-symbol passwords, users' personal data, digital certificates and integrated with access control to premises, staff T&A systems, etc.
We use products of leading vendors: Avanpost, Aladdin
Firewall/VPN (Firewall/Virtual Private Network)
Firewalls ensure a secure connection of the corporate network to public networks based on your security policies. This creates a reliable protection of the organization's perimeter, ensuring control of information flows between the corporate network segments, as well as limiting access to internal (published) resources of the corporate network from outside.
The Corporate Protection System for communication channels (VPN) provide the client's employees and partner a secure environment to transfer confidential information over the internet, guaranteeing the data's integrity and authenticity.
We use products of leading vendors: Cisco, Stone Soft, Juniper, McAfee
Web/URL Security Gateway
The control system for incoming web traffic scans and analyzes the data flows ("packages") received in response to user requests (e.g. from your website) for potential danger. The system isolates malicious traffic from the organization's internal network in real time, preventing possible threats to information security.
We use products of leading vendors: McAfee, WebSense
The backup system is a hardware and software solution designed to create additional copies of critical information. It is a key component of your business continuity strategy. According to Gartner, among the companies affected by disasters or having experienced major loss of corporate data (for any reason), 43% were unable to continue their business due to the lack of a backup system. Don't be caught by the unexpected, when it's so easy to prepare for it.
We use products of leading vendows: Symantec, Acronis
There are dozens of ways to recover information you thought was deleted. Secure deletion of information prevents leakage of critical information that you thought had been destroyed. Frequently some data have strictly limited "shelf lives," and must be destroyed after a certain date. When that is the case, we can remotely select this specific data and permanently destroy it, so that it is unrecoverable from then forward. Your data and your company are thus protected.
We use products of leading vendors: Blancco
SIEM (Security Information and Event Management)
In large, geographically diverse organizations the number and variety of events related to security can make it impossible to manually collect and analyze them for potential threats. As a result, threats can go unnoticed, and unresponded to, leaving the company in a vulnerable position.
At the same time, there may be no clear procedures for investigation and response to incidents that are discovered.
As a result, serious vulnerabilities and threats my go unnoticed by the security team for a extended periods, significantly increasing the financial, legal, and reputational risk of the company.
We use products of leading vendors: Symantec
Data Base Protection
Databases have become one of the most critical assets for many companies, and protecting them is one of IT's highest priority jobs. Logging user activity in these databases, monitoring their vulnerabilities, and protecting against intrusion are paramount to ensuring your data, and your business, stay safe. We know the threats that are out there and how to protect against them. With Bell, you'll be confident in the safety of your data and the security of your business.
We use products of leading vendors: IBM Guardium
Special consulting services
Information Security Strategy
With the IT infrastructure and data being such critical assets to any company, securing them has to be part of the overall company strategy.
We'll provide the expert consulting you need to construct an IT security strategy that fits your needs, budgets, and protection level. In addition, we'll create a flexible security strategy so that, if you need to change or increase your security later, you can do so quickly and cost-effectively.
Information Security Audit
An Information Security Audit is comprehensive-we look at everything to ensure you know the exact status of your security across your entire company or within a specific department. This enables you to make fact-based decisions on whether you need to increase your levels and, if so, how to do so most effectively.
An audit may be performed for the company, for individual critical areas, business processes, or specific information systems.
IT Security Outsourcing
Bell Integrator is a global IT outsourcing company, offering a comprehensive set of information security services to protect your IT infrastructure. By leveraging our geo-diverse delivery centers in nine locations in Europe and North America, we perform projects all over the world, offering IT outsourcing services in a cost-effective and efficient manner.