Integrating security solutions

To meet your demands, AlgoSecure works with various outsiders and pragmatically innovative partners. These close relationships guarantee a global and efficient solution thanks to our operationnal expertise based on our consulting and engineering missions.

Our interventions are made in total independance from editors.

servers

There are various workstations security needs, and they vary depending on the environment (within the company, or mobile). AlgoSecure takes care of the following security needs:

  • Ensure data integrity and data confidentiality
  • Setup a security policy on external devices (CD-ROM player, USB ports...)
  • Protect against external threats as well as suspect behavior from legit users
  • Protect against malware and viruses
  • Setup a strong authentication
  • Verify the workstation conformity with the company's security policy

The LAN security needs are to be defined according to your environment, your needs and your security goals. AlgoSecure takes care of the following security needs:

  • Protect against the insider's threat (data theft, documents forging, embezzlement...) as well as external threats (intrusions, denial of service...)
  • Proactive protection against malware and viruses
  • Customized protection according to the servers' criticity and business applications
  • Infrastructure or applications redundancy
  • Vulnerable hardware isolation (quarantines)

Securing the company's web accesses constitutes one of the pillars of an information system's security. AlgoSecure takes care of the following security needs:

  • Users authentication
  • Controlled management and traceability of web resources
  • Integrity and conformity checks for content imported through a WAF (Web Application Filter)
  • Complete control over data encapsulated through the HTTP protocol (hidden streams: P2P, IM, Skype...)
  • Abide by the current regulations (keep the connection logs...)

Nomadic access to business applications are unavoidable. AlgoSecure takes care of the following security needs:

  • Ensure strong authentication for accessing the information system's resources
  • Check the integrity of the user's devices (computer, laptop, smartphone...) before he can access the information system's resources
  • Ensure data integrity and data confidentiality when using external networks through a VPN (Virtual Private Network)

Wifi users connect to your information system's resources as well as any other user. It is therefore crucial to secure this access. AlgoSecure takes care of the following security needs:

  • Setup secure wireless networks
  • Wireless network access control and authentication (of both users and access points)
  • Easy WLAN management
  • Detecting, locating and deactivation of RAP (Rogue Access Points)
  • QoS (Quality of Service) configuration allowing resources-demanding applications like VoIP

Email systems have specific risks and constraints. AlgoSecure takes care of the following security needs:

  • Ensure a satisfactory disponibility of the service
  • Ensure a real-time monitoring of hardware and services
  • Ensure a performance monitoring
  • Prevent spam and viruses spreading
  • Propose a credible alternative to Microsoft Exchange