Email : sales@nexagate.com

Tel  : +603 2242 0342

WhatsApp: +60133911347

  • Facebook Black Round
  • Google+ Black Round

© Nexagate 2019 All Rights Reserved

SECURITY PROTECTION
Cyber Security Managed Solutions
 
MANAGED WEB SECURITY

Nexagate partners with Incapsula to deliver cloud-based website security solution that features the industry’s leading WAF technology, as well as strong two-factor authentication and bot access control. An advanced client classification engine analyzes all incoming traffic to your site, preventing access to malicious and unwanted visitors. Complementing the WAF’s built-in security capabilities, our managed web security solution provides easy-to-use tools that enable enterprises to build custom security rules tailored to their specific requirements. 

Key Features:

  • Best-in-class, PCI-certified web application firewall

  • Custom rules tailored to your enterprise’s security policy and use cases

  • Two-factor authentication for website access

  • Advanced client classification engine that analyzes all incoming traffic

  • Easy-to-use API for integration with backend systems

Why Choose Us:

  • Cloud-based, big data approach leverages customer base for 360-degree visibility into attack landscape 

  • Proven against hundreds of penetration tests and millions of attacks every day

  • Dedicated security research team monitors, tunes, and updates the service to ensure protection against new and emerging threats

  • Decades of security experience and best practices, leveraging Imperva’s market-leading WAF technology

  • Dynamic profiling and application- aware technologies minimize false positives

  • Activated by simple DNS change – no hardware or software installation, integration, or changes to the website

Maybe you’ve been DDoSed and need to better understand how to protect your organization. Or like others, you may be looking for a replacement DDoS solution that is better equipped to handle the changed threat environment. Like others who’ve been attacked, you’ve suffered something between a minor nuisance and some significant harm. And if you’re one of the few that haven’t been attacked yet, chances are you will be. Imperva has analyzed and solved the DDoS, or Distributed Denial of Service threat for several years now and we are certain the menace isn’t going away soon.

 

Nexagate partners with Incapsula to deliver enterprise class-leading Managed DDoS Protection  to protect you whatever attack comes your way and no matter what the future holds.

Key Features:

  • Over 2 Tbps global cloud network absorbs the largest attacks with specialized support for massive volumetric attacks

  • Advanced algorithms solve the most difficult application layer attacks without challenging legitimate users

  • Protects Web, DNS, network devices and application servers

  • Deploy for a single server or an entire class C network

  • Supports Anycast DNS and Unicast DNS routing

  • Supports on-demand BGP routing

  • Monitors attacks as they happen

  • 24/7 operations center

  • Backed by the Imperva security research team

  • Part of a comprehensive solution that includes web security, content delivery 

Why Choose Us:

  • Automatic always-on detection & triggering of “under attack” mode; on-demand option available.

  • Zero business disruption based on transparent mitigation with minimum false positives.

  • End-to-endrotection against the largest and smartest DDoS attacks

  • Activated by simple DNS change - no hardware or software installation, integration or changes to the website. 

MANAGED DDOS PROTECTION
 

Important security risks are encountered when unauthorized devices access corporate networks. These machines may contain viruses, which can spread to legitimate computers, or unauthorized users may attempt to access confidential information within the organization. Our NAC solution is powered by MAY Cyber's ScopNET; an agentless, 802.1X independent solution to prevent unauthorized computer access to corporate networks.

Key Features:

  • Agentless architecture

  • No software installations or appliance required in remote locations.

  • Different methods for detecting & preventing network access of a computer:ARP Redirection/Poisoning, 

  • Detailed inventory collection

  • Threat detection for events like port scanning, password scanning, SYN attack, virtual host NAT, rogue DHCP and real IP Address detection

  • Central management and deployment.

Why Choose Us:

  • Total Control of Infrastructure. Any device accessing the network is tracked, authenticated & authorized

  • Detection of Threats to Critical Systems. Monitoring endpoints and tracking network activity can pinpoint threats targeting critical systems.

  • Total Visibility of the Network. The system collects inventory of Windows/ MAC/Linux OS and network devices. Collected information enables organizations to perform better planning for future requirements.

  • Lower Operational Costs & Easy Implementation/Management

NETWORK ACCESS CONTROL (NAC)
 
 

Our APT & Endpoint Security solution is the next generation of endpoint protection. Not only can the solutions help detect what anti-virus detects, but also what it misses. Its comprehensive endpoint visibility and threat intelligence enables analysts to adapt their defense based on real-time details to deploy informed, tailored responses to threat activity. Our solution is powered by industry-leading cyber security platform, FireEye that delivers protection beyond a single limited methodology. It enhances overall threat protection by integrating key security mechanisms within a single agent and threat management workflow system. 

Key Features:

  • Single agent with three detection engines to minimize configuration and maximize detection and blocking

  • Single integrated workflow to analyze and respond to threats within Endpoint Security

  • Fully integrated malware protection with antivirus (AV) defenses, remediation, behavior analysis, intelligence and endpoint visibility

  • Triage Summary and Audit Viewer for exhaustive inspection and analysis of threats

Why Choose Us:

  • Prevent the majority of cyber attacks against the endpoints of an environment

  • Detect and block breaches that occur to reduce the impact of a breach

  • Improve productivity and efficiency by uncovering threats rather than chasing alerts

  • Use a single, small-footprint agent for minimal end-user impact

  • Comply with regulations, such as ISO27001 and PCI-DSS

  • Deploy onsite or in-the-cloud

APT & ENDPOINT SECURITY
MANAGED SIEM / LOG MANAGEMENT
 

Single-purpose SIEM software or log management tools provide valuable information, but often require expensive integration efforts to bring in log files from disparate sources such as asset management, vulnerability assessment, and IDS products. Nexagate partners with AlienVault to offer Managed SIEM/Log Management services. Our SIEM solution is built-in with other essential security tools for complete security visibility that simplifies and accelerates threat detection, incident response, and compliance management.

 

Drastically simplify SIEM deployment and gain valuable insight into your environment with an all-in-one platform that includes all the essential security capabilities you need, managed from a single pane of glass, working together to provide the most complete view of your security posture.

Key Features:

  • Unified, Coordinated Security Monitoring

  • Simple Security Event Management and Reporting

  • SIEM / event correlation

  • Asset discovery and inventory

  • Vulnerability assessment

  • Intrusion detection

  • Continuous Threat Intelligence

  • Fast Deployment

  • Multiple Security Functions Without Multiple Consoles

Why Choose Us:

  • Fully supported hardware and software deployment options.

  • Cutting edge, fully integrated security intelligence from Nexagate-AlienVault Labs acts like your own dedicated threat research team, keeping you up-to-date against the latest threats.

  • Community-powered threat data from AlienVault Open Threat Exchange™ (OTX) alerts you when known malicious hosts are communicating with subscribers’ systems.

  • Easily build security offerings around our Managed Services and Solution to provide Asset Discover / Vulnerability Assessment., Network and / or host IDS, File Integrity Monitoring (FIM), Security Information and Event Management (SIEM), and more.