CYBER SECURITY

Cyber SecurIty

Milkor provides end-to-end security solutions for the monitoring, assessment and defence of your information assets. The objective is to achieve complete confidentiality, data integrity, information availability, accountability and assurance (governance) for you, Milkor’s customer.

Specialist engineers work to protect and secure your organisation’s data, systems, media and IT facilities. This process is essential for protecting the privacy of valuable and confidential customer information. Milkor’s specialist security team works closely with its customers to establish and maintain information security by identifying, managing and controlling risks.

Part of Milkor’s value proposition is the security operations centre (SOC), which runs 24 hours a day, seven days a week, monitoring your security environment and systems every second of every day. It provides worldwide security and maintains a consistent link into the worldwide security network for the most current information on threats. Specialised tools are used in minimising threats and making sure they don’t become a reality.

CYBER 1200-600

 

The SOC technology that is employed is based on an industry-leading security incident and event management (SIEM) tool. An orchestration layer integrates people, processes and technology, allowing investments to be optimised.This agile framework enables analysts to detect and respond to security incidents and data breaches more efficiently, and also provides: centralised incident management aggregates and connects system and processes, integrated context during incident response, industry best practices for incident response and breach management, as well as tracking and reporting on key performance indicators to SOC stakeholders

EXTENDED INFORMATION
Milkor’s cyber security offering makes use of these security objectives for your ultimate protection:

– Vulnerability management is a timeous vulnerability identification solution that allows for proactive remediation.

– Content filtering: a refined solutions layer that provides Web and e-mail filtering to eliminate large volumes of unsolicited content reaching internal network environments.

– Intrusion prevention system (IPS): a powerful mechanism that alerts and blocks harmful intrusions such as denial-of-service attacks, hacking and other malicious cyber activity.

– Perimeter defence: firewalls and unified threat management systems (UTMS) that are an effective first line defence for restricting and controlling access at the network perimeter.

Data network access control (NAC): policy-defined technology that is        implemented to restrict access to network resources and services.

    – Endpoint security: a robust and reliable protection strategy that                    ensures the safety of endpoint devices. Data loss prevention (DLP) and          encryption: A common method of reducing the risk of unintentionally              disclosing confidential information using decryption keys.     

    – Database security: identity and access controls that protect data,                  database applications, database systems, database servers and the                associated network.

     – Identity management: technology that protects access to information         and resources by managing individual identities, their authentication,             authorisation, roles, privileges and permissions within or across system         and enterprise boundaries.

     – Governance, risk management and compliance (GRC): integrated              activities that encompass ,enterprise risk management (ERM) and                    compliance with applicable laws and regulations

ASSURANCE

Governance & compliance
Penetration testing
Remediation
Incident response
Vulnerability management

DATA

Data loss prevention
Content management
Web and email protection
Database activity monitoring

DEVICE AND SECURITY

                   Removable media protection                  End point security
Device control
Encryption

NETWORK

Firewalls
Intrusion prevention
Proxy
Advanced threat protection

APPLICATION

Application control
CAS-B
Application firewalls