CYBER SECURITY

MFA for given application or system:

Technology Compatibility Using native connectors and APIs, Rublon integrates with business technologies like Windows, Active Directory, Remote Desktop, AD FS, VPN, SSH, as well as LDAP, RADIUS, and SAML protocols. Hardware Authentication On top of software authentication methods like Mobile Push and Mobile Passcode, Rublon offers strong authentication using phishing-resistant FIDO2 security keys. Scalable & […]

MFA for VPN:

Millions of employees use Virtual Private Networks (VPNs) to access a company’s resources through the public internet. Unfortunately, hackers often use remote access via VPN as a cyberattack vector. If a company uses only passwords to protect its VPN, obtaining a single employee’s password could allow hackers to access the entire corporate network. Multi-Factor Authentication […]

MFA for Microsoft services:

/ / /
Lots of enterprises use Microsoft technologies. Rublon is a Multi-Factor Authentication (MFA) solution you may use to authenticate to Microsoft services. As a MFA solution, even if hackers manage to obtain your main password to the Microsoft service you want to sign in then MFA will stop them from infiltrating your system through the service […]

Backup&Recovery – Xopero ONE

/ / / / / /
Xopero ONE Backup&Recovery is a software that can be easily integrated to build a comprehensive backup strategy for any of your physical, virtual, or SaaS infrastructures. The ease of deployment – both SaaS and On-premise – and management can make the protection of even the most complex infrastructure simple and secure, guaranteeing your company’s BCDR. […]

Backup&Recovery – XUP

/ / / /
Xopero Unified Protection is an all-in-ONE backup appliance that combines powerful hardware with disk array, archiver, deduplication device, comprehensive backup software, and easy-to-use central management. Everything to ensure your company’s BCDR. Key advantages to Xopero Unified Protection: Flexibility: best value for money (what you pay depends on space to be available, not on the number […]

Network Access Control – NACVIEW

/
NAC stands for “Network Access Control“. Without this tool, dealing with which device should have and has access to your Company network becomes a … nightmare. Whoever you are – whether you are an employee or a guest – IT guys can rely on this tool in order to control and optimize access permissions to […]