SOLUTIONS
Here you can find more details about the technologies we utilize in our services.
Identity Management
Identity Management
DDoS
DDoS
2FA
2FA
HSM
HSM
ADP/ATP
ADP/ATP
Advanced Threat Detection or ATD is a bit of a vague name. If for nothing else, then because every self-respecting vendor says its products are advanced, or next generation.
Backups
Backups
Application Security
Application Security
User Monitoring
User Monitoring
Insider threat is a security threat to network assets and business data coming from company employees and contractors or partners with access to the network. Data breaches caused by employees are often unintentional, losing a company laptop or sending a document to a wrong address.
SIEM
SIEM
CASB
CASB
UEBA
UEBA
Insider threat is a security threat to network assets and most importantly business data coming from insiders. Insiders are company employees and contractors or partners. The data breaches caused by employees are in much larger percent unintentional. Like losing a company laptop or sending a business document to a wrong address.
WAF
WAF
DLP
DLP
NGFW
NGFW
A next-generation firewall (NGFW) is the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities like application firewall using in-line deep packet inspection (DPI), intrusion detection or prevention system (IDS/IPS), TLS/SSL encrypted traffic inspection, website filtering, malware inspection and so on.
Endpoint Protection
Endpoint Protection
Security doesn’t come for granted, and criminals are hardly waiting to get into your system and network. They are after your data and they have a great (financial) motivation. When talking about Endpoint protection or endpoint security, we are referring to security of individual devices such as workstations, servers and mobile devices, from which a network is accessed.
Data Classification
Data Classificatiom
IT Forensics
IT Forensics
In our region of the world, smaller countries of Balkan peninsula, we tend to associate digital forensics with law enforcement agencies only. But in a larger world they are more often than not done by private investigators in commercial sector. Corporations and larger organizations often find themselves in situations, were they need to do an electronic investigation by themselves, for their own needs.
IPS/IDS
IPS/IDS
IPS or Intrusion Prevention System is a perimeter security solution, like a firewall for instance. Network perimeter is a boundary between an organizational local network and the rest of the world. Usually that’s a connection to Internet Provider, national network, another company or something like that. Often there are at least two connections, for redundancy.
Contact Us
Main: +359 2 439 2000
Information Security: +359 2 439 2009
software@computer2000.bg
63 Shipchenski Prohod Blvd, Sofia 1574, Bulgaria
Monday-Friday: 9am – 6pm