Solutions - Computer 2000

SOLUTIONS

Here you can find more details about the technologies we utilize in our services

Identity Management

Identity Management

Securing enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises is a must.

DDoS

DDoS

A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. 

2FA

2FA

Computers are very useful tools, but they are only secure when they can identify and distinguish between users in a reliable and secure way. 

HSM

HSM

All data is not equal. Some data is more important. Even the business data. We protect all the business data. But there is a small fraction of data, that is on a completely different level, much more important. It requires extra special security measures.

ADP/ATP

ADP/ATP

Advanced Threat Detection or ATD is a bit of a vague name. If for nothing else, then because every self-respecting vendor says its products are advanced, or next generation.

Backups

Backups

What’s the most important, irreplaceable thing in your possession? The memories of the experiences you had. If you took photos of your wedding, or a video of your child’s first steps, you trust your hard drive to store this data.

Application Security

Application Security

For an outside cybercriminal to steal data, she or he first has to gain access to a network. This could be through direct access in a location with a connection point to a network or being directly at a computer on a network.

User Monitoring

User Monitoring

Insider threat is a security threat to network assets and business data coming from company employees and contractors or partners with access to the network. Data breaches caused by employees are often unintentional, losing a company laptop or sending a document to a wrong address. 

SIEM

SIEM

Imagine a battle. Why? Because cybersecurity is a battle, an ongoing war actually! And to win a battle, it has to be lead, all your battle units need to be coordinated well. And you need an overview of a battlefield. A place to make your decisions. For all that you need battle headquarters. 

CASB

CASB

For most of the people internet usage is 99% of web and 1% or less of email sent and received traffic. Since email is important for business, we tend to give equal importance to web and email gateway security solutions in corporate environments. 

UEBA

UEBA

Insider threat is a security threat to network assets and most importantly business data coming from insiders. Insiders are company employees and contractors or partners. The data breaches caused by employees are in much larger percent unintentional. Like losing a company laptop or sending a business document to a wrong address.

WAF

WAF

Web Application Firewall, or WAF, is an additional security solution to protect the traffic between your (usually) internal web application server, and the rest of the world. It’s important in environments, where the applications are available from anywhere in the internet, even though the actuall aplication access is allowed only for authorized users.

DLP

DLP

Insider threat is a security threat to network assets and most importantly business data, from people inside a network. Insiders are company employees and contractors or partners. The data breaches caused by employees are lots of times unintentional, losing a company laptop or sending a business document to a wrong address

NGFW

NGFW

A next-generation firewall (NGFW) is the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities like application firewall using in-line deep packet inspection (DPI), intrusion detection or prevention system (IDS/IPS), TLS/SSL encrypted traffic inspection, website filtering, malware inspection and so on.

Endpoint Protection

Endpoint Protection

Security doesn’t come for granted, and criminals are hardly waiting to get into your system and network. They are after your data and they have a great (financial) motivation. When talking about Endpoint protection or endpoint security, we are referring to security of individual devices such as workstations, servers and mobile devices, from which a network is accessed.

Data Clasification

Data Clasificatiom

Organizations have limited resources to invest in safeguarding their data. Knowing exactly what data needs protection will help you set priorities and develop a sound plan so you can allocate your budget and other resources wisely, minimizing security and compliance costs. But where’s the best place to start? Data classification provides a solid foundation for a data security strategy because it helps identify risky areas in the IT network, both on premises and in the cloud.

IT Forensics

IT Forensics

In our region of the world, smaller countries of Balkan peninsula, we tend to associate digital forensics with law enforcement agencies only. But in a larger world they are more often than not done by private investigators in commercial sector. Corporations and larger organizations often find themselves in situations, were they need to do an electronic investigation by themselves, for their own needs.

IPS/IDS

IPS/IDS

IPS or Intrusion Prevention System is a perimeter security solution, like a firewall for instance. Network perimeter is a boundary between an organizational local network and the rest of the world. Usually that’s a connection to Internet Provider, national network, another company or something like that. Often there are at least two connections, for redundancy.

Contact Us

Main: +359 2 439 2000

Information Security: +359 2 439 2009

software@computer2000.bg

63 Shipchenski Prohod Blvd, Sofia 1574, Bulgaria

Monday-Friday: 9am – 6pm

Send an Inquiry

Let’s walk through the journey of digital transformation together.