Data Classification
Data Loss Prevention (DLP)
Data Encryption
Sensitive Data Discovery
Privilege Manager
Secure File Sharing
Privileged Access Management (PAM)
Web Application Firewall (WAF)
API Security
AI Security
Container Security
Network Deception
APT Protection and Sandboxing
Network Detection & Response (NDR)
Extended Detection & Response (XDR)
Network Forensics
Content Disarm & Reconstruction (CDR)
Email Security
SSL TLS Visibility
Proxy
Cloud Native Application Protection (CNAPP)
Cloud Access Security Broker (CASB)
Cloud Security Posture Management (CSPM)
Zero- Trust Network Access (ZTNA)
Secure Access Service Edge (SASE)
IT & Security Risk Management
Business Resilience
Audit Management
Third Party Governance
Enterprise & Operational Risk Management
Regulatory & Corporate Compliance Management
OT Network Monitoring
OT Hygiene
OT Firewall
OT Network Access Control
OT Privileged Access Management
File Integrity Monitoring (FIM)
Endpoint Protection Platform (EPP)
Web Isolation
Endpoint Detection & Response (EDR)
Endpoint & AD Deception
Security Asset Management
Continuous Threat Exposure Management (CTEM)
Security Orchestration, Automation, and Response (SOAR)
Attack Surface Management
Security Information and Event Management (SIEM)
Breach Attack Simulation (BAS)
Cyber Threat Intelligence (CTI)
Cyber Security Exercise
Pacific Plaza Sevinçli Sok. N3/9 K8 34750
Ataşehir İstanbul
+90 212 296 6190
Dubai Internet City Building 16
Office 240-241Dubai
+971 58 692 4448
Alromayla 41 Wattayah,
Muscat PC OM, 111
+968 9988 2828
Avenida da República, nº 50,
2º, 1050-196 Lisboa
+351 211 229 001