Subscribe

Archive for the Solution Portfolio Category

Privileged User Monitoring

Shell Control Box is a user monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise device, completely independent from clients and servers – integrating seamlessly into existing networks. SCB

Read more

Managed file transfer

Managed file transfer (“MFT”) refers to software or a service that manages the secure transfer of data from one computer to another through a network (e.g., the Internet). MFT software is marketed to corporate enterprises as an alternative to using ad-hoc file transfer solutions, such as FTP,

Read more

Privileged Activity Monitoring

Shell Control Box is an activity monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise tool with the widest protocol coverage on the market. It is completely independent from

Read more

Enterprise Fraud Management

Intellinx Intellinx is an innovative and unique software product for tracking end-user activity in internal business applications in heterogeneous platforms including legacy systems. Intellinx introduces a new dimension in auditing and fraud detection – the ability to record the interaction of all end-users with all the central

Read more

Enterprise Syslog System

Syslog-ng Premium Edition The syslog-ng Premium Edition™ (PE) logging solution allows enterprises to build a powerful, trusted and centralized logging infrastructure for reviewing and auditing log messages of over 40 platforms. With syslog-ng PE business and IT managers can easily meet compliance requirements while lowering operational costs.

Read more

Privileged Access Monitoring

Crypto Auditor CryptoAuditor is a centrally managed inline appliance or virtual appliance which has the ability to audit and review encrypted data and monitor privileged users’ activities even in encrypted environments. One of the key benefits of the CryptoAuditor is that it can be easily managed through

Read more

Intrution Prevention Solutions

Endpoint Advanced Threat Defence – Fidelis Endpoint Is your organisation looking for a solution for automating remediation and hastening the incident response process? Is your organisation looking for a solution which can prevent modern malware attacks? (For example: traditional solutions adopting whitelisting approach creates a single pointRead more

Network Access Control

Portnox access layers’ portnox™ is the first NAC product that practically checks for the most important mandatory legitimate access factor: Is the device attempting access from within the network is a known and legitimate company device? is it approved to access the network? At this point it

Read more

Web Application Firewall

WEB Insight SG WEB INSIGHT SG is a hardware-based Gateway type appliance which is configured as a proxy in the network. It is a real Web firewall solution to detect and block hacking attempts from outside and attacks in real-time which is using web application vulnerability without

Read more

Secured Web Sessions

Web Browsers: Your New Security Perimeter The increase in web applications, cloud computing, SaaS and BYOD means web browsers have become the common interface for accessing information that drives business activity. Data loss from theft or leaks, denial of service attacks, Man-in-the-Browser attacks – all of the

Read more
Page 1 of 212

Latest News

Contact us

Call us (+65) 8799 9213

Email : enquiry@dtasiagroup.com

Addr: 21 Bukit Batok Crescent, Singapore 658065