MITAS HANOI TECHNOLOGY JSC http://en.mitas.vn Leading in technology Mon, 15 Jul 2024 04:36:37 +0000 en-US hourly 1 https://wordpress.org/?v=5.4.1 Unified Endpoint Management Solution http://en.mitas.vn/unified-endpoint-management-solution-1542/ http://en.mitas.vn/unified-endpoint-management-solution-1542/#respond Mon, 15 Jul 2024 04:36:37 +0000 http://en.mitas.vn/?p=1542 ManageEngine’s Endpoint Central solution helps optimize the efficiency of IT service management with many superior features.

1. ManageEngine’s Endpoint Central solution

ManageEngine was officially launched in 2000 and is owned by Zoho, India’s leading software development corporation. Zoho is considered the “father” of innovative technology solutions and business tools and is extremely popular with businesses worldwide.

With many devices varying in form and function, IT management will be ineffective if it depends on human resources. The optimal method in IT service management is demonstrated through software solutions, controlling and automating equipment and asset management, and managing IT tasks.

ManageEngine Endpoint Central solution is a centralized UEM (Unified Endpoint Management) management solution, Windows-based application, web-based control, and system access from anywhere, helping to manage servers, desktop computers, and mobile devices.

It includes features like Software Deployment, Patch Management, Service Pack Installation, and more.

2. Features of Endpoint Central solution

* Patch Management:

  • Automatically patch Windows, Mac, Linux, and third-party applications
  • Proactively detect and deploy missing patches
  • Test and approve patches before deployment to minimize security risks
  • Deploy zero-day patches
  • Disable automatic updates and decline patches when necessary

* Software management

  • Install or uninstall MSI and EXE applications.
  • Schedule and execute software deployment
  • Allows users to install software themselves using the Self-service Portal.
  • Use more than 1,300 templates to deploy applications.
  • Create a repository for installation packages.
  • Install the software with the Run As option in the specified user role.

* Asset management

  • Monitor all hardware and software in the network
  • Make sure the software is copyrighted.
  • Block execution and uninstallation of prohibited software
  • Statistics of software in use
  • Receive specific alerts, such as detection of new software, unlicensed software, and banned software
  • Supports 20 types of Reports about hardware, software, Inventory, and licenses

* Mobile devices management

  • Automate mass enrollment and authentication of BYOD and devices
  • Control operating system updates and troubleshoot remote device access issues
  • Gain complete visibility into your organization’s mobile devices
  • Mobile device asset statistics through predefined and customized reports.

* Application management on mobile devices

  • Create an application store containing IT-approved internal and commercial applications.
  • Install in Silent mode, update and delete applications while managing licenses and app configuration permissions.
  • Ensure devices only run trusted applications, blacklist malicious/vulnerable applications, and prevent users from uninstalling applications.

* Security management on mobile devices

  • Configure and enforce security policies related to Wifi, VPN, email, etc.
  • Prevent unauthorized access to email, ensure safe sending/receiving, saving, and viewing of content
  • Enforce device-level encryption, isolate corporate and personal workspaces on BYOD devices, locate, lock, and erase misplaced devices

* Endpoint system management tool

  • Monitor and analyze remotely managed systems by viewing task details and running processes.
  • Instantly start your remote machine using Wake-on-LAN or schedule a start-up.
  • Export announcements company-wide or just to technicians
  • Schedule disk defragmentation, auditing, and cleanup for local or remote workstations.

* Remote Control

  • Leverage secure remote control, complying with HIPAA and PCI, DSS regulations.
  • Troubleshoot remote desktop problems with multi-user collaboration.
  • Integrated video, calling, chat, and options for transferring files between devices.
  • Record all remote control sessions for audit purposes.
  • Lock the end user’s keyboard and mouse and turn off their monitor to ensure confidentiality during remote connection sessions.
  • Uses 128-bit AES encryption protocols during remote control operations.

* Configurations

  • Standardize basic computer configurations, applications, and security settings across the entire organization.
  • Supports over 40 configurations for users and computers or creates Templates for frequently used configurations.
  • Supports more than 180 Scripts while storing Scripts.
  • Restrict and control the use of USB devices such as printers, CD drives, Portable devices, Bluetooth devices, modems, and other peripherals in the network, both at the user and computer level.
  • Switch to power saving mode by applying Power schemes, turning off the computer when idle, and reporting uptime.
  • Configure browser, firewall, and security policies, manage file, folder, and Registry access control.
  • Set up alerts for expired passwords and low system disk space.

* OS deployment

  • Automatically capture your computer’s OS image, whether on or off.
  • Store Images in a centralized repository and perform deployment when needed.
  • Use a Deployment Template to deploy Images depending on roles and departments in the organization.
  • Perform OS deployment on different types of hardware.
  • Perform post-deployment after OS deployment, such as installing applications, setting up machine configuration, etc.

* Report

  • Use over 150 user, computer, group, OU, and domain (ActiveDirectory) reports.
  • Uptime reports and power management (Lower utility bills witch effective power management).
  • Detailed reports on user input information.
  • Reports on patches, configuration, and events.


Our company always wishes to become a reliable partner and a leading supplier of equipment and solutions for the success of our customers. For more detailed information, please contact:

MITAS Hanoi Technology JSC

Address: 5th Floor, C’Land Building, No. 81 Le Duc Tho St., My Dinh 2 Ward, Nam Tu Liem Dist., Hanoi, Vietnam           

Web: https://mitas.vn  | Tel: (+84) 243 8585 111 | Email: sales@mitas.vn

The trust and support of our customers are a driving force and an invaluable asset to our company. We sincerely thank you./.

]]>
http://en.mitas.vn/unified-endpoint-management-solution-1542/feed/ 0
Solution to scan and verify security vulnerabilities with Pentera’s product suite http://en.mitas.vn/solution-to-scan-and-verify-security-vulnerabilities-with-penteras-product-suite-1523/ http://en.mitas.vn/solution-to-scan-and-verify-security-vulnerabilities-with-penteras-product-suite-1523/#respond Thu, 20 Jun 2024 03:35:08 +0000 http://en.mitas.vn/?p=1523 Pentera’s platform helps users minimize security risks and provides the ability to protect against cybersecurity threats.

1. Introduction about Pentera

Pentera is a company specializing in researching and developing products that scan and verify the impact of security vulnerabilities on the system. With nearly ten years of experience in the field of security vulnerability scanning and troubleshooting, Pentera experts have designed and launched a solution platform called Automated Security Validation, or specialized automatic security vulnerability scanning and verification.

Pentera’s awards:

 

Recently, Pentera was honored by Frost & Sullivan with the Global Market Leadership Award for its Breach Attack Simulation (BAS) solution. This award recognizes Pentera achieving the largest market share through superior performance, products and services.

Frost & Sullivan is a prestigious organization that evaluates organizations and provides market research and strategic consulting. The organization applied a rigorous analytical process to assess multiple candidates for each award category before determining the final award recipient. This process includes a detailed review of 10 best practice criteria for each nominated company.

Pentera’s automated security validation platform significantly enables users to improve their security readiness and resistance to cyber threats. Pentera’s platform simulates the real-world techniques of hackers in an organization’s live IT environment across the entire cyber attack surface. The platform continuously audits existing cybersecurity controls to uncover real risks and provides security teams with an actionable roadmap to mitigate security risks. That’s why Pentera has excellently achieved this award.

Reference link: https://pentera.io/press-release/pentera-receives-global-bas-market-leadership-award-from-frost-sullivan/

2. Pentera’s solutions

With a foundation of security analysis experts, Pentera has provided a platform of security scanning and authentication solutions, including 02 main products:

Pentera Surface: External Attack Surface management solution allows detecting and validating enterprise security vulnerabilities from the internet.

Pentera Core: Automated penetration test and red teaming tool allows leak scanning and penetration testing of those vulnerabilities within the internal environment.

3. Introduction to Pentera Core

Penta’s Pentera security authentication and scanning solution includes three main elements:

  • Real-time updates as an attack progresses through an organization, from users to systems and attacker tactics, techniques, and procedures (TTP).
  • Rank results and “Achievements” from test results, complete with attack patterns and mapping to Miter’s ATT&CK® Matrix.
  • Outcome-specific recommendations are designed to help organizations successfully mitigate and/or prevent threat actor techniques.

The operating principle of the solution is a closed circle that simulates the attacker’s attack behavior, including steps to detect, attack, and exploit. Based on that, it is possible to determine how much each detected leak will affect the system. The solution’s operational diagram is described in the following chart:

The solution’s life cycle will act like a hacker.

When penetrating the system, Pentera will identify the network system (Network Recon) and scan for security holes. Then, the solution will test those vulnerabilities with a set of behaviors similar to real attackers (retrieving information about users, cracking passwords, relay attacks, malware injection,…) to be able to identify and Exploit the system to verify whether or not the detected vulnerabilities will affect the system.

The attack simulation steps will be saved and presented as a step-by-step attack diagram, allowing pentesters to observe the cycle and verify the root-cause of those attacks.

By collecting details of the attack steps, Pentera can quickly develop ways to fix vulnerabilities, help the system patch vulnerabilities, and improve the security system (Security posture) of the organizations.

All vulnerability scanning and validation processes are performed automatically based on Pentera’s advanced Pentera Core platform, which helps customers determine and evaluate the security level of the business’s internal information technology system, contributing to improving and minimizing their risks.

Outstanding features:

  • Diverse attack surface coverage: The only platform covering the detection, assessment, and exploitation of internal and external attack surfaces to identify real security vulnerabilities accurately.
  • Identify real risks: By simulating real-world attack organizations, allowing the discovery of their exploitable attack surface and uncovering security vulnerabilities that can be compromised violation.
  • Easy Operation: Without using any agents or Playbooks, Pentera automatically validates the system’s resilience against the latest adversary techniques.
  • Update the latest attack techniques: The Pentera Labs research team continuously provides the Pentara platform with the newest validation tests on threats and hacking techniques.

Our company always wishes to become a reliable partner and a leading supplier of equipment and solutions for the success of our customers. For more detailed information, please contact:

MITAS Hanoi Technology JSC

Address: 5th Floor, C’Land Building, No. 81 Le Duc Tho St., My Dinh 2 Ward, Nam Tu Liem Dist., Hanoi, Vietnam           

Web: https://mitas.vn  | Tel: (+84) 243 8585 111 | Email: sales@mitas.vn

The trust and support of our customers are a driving force and an invaluable asset to our company. We sincerely thank you./.

]]>
http://en.mitas.vn/solution-to-scan-and-verify-security-vulnerabilities-with-penteras-product-suite-1523/feed/ 0
[Information Security – Cyber Security] Metadefender Kiosk Solution http://en.mitas.vn/information-security-cyber-security-metadefender-kiosk-solution-655/ http://en.mitas.vn/information-security-cyber-security-metadefender-kiosk-solution-655/#respond Wed, 29 Mar 2023 03:16:06 +0000 http://en.mitas.vn/?p=655 MetaDefender Kiosk is trusted by organizations with the highest levels of security, which can detect and stop all information security threats before the peripheral is brought into the critical area.

Information security situation and malware control challenges:

The current situation of information security in Vietnam is increasingly complicated and dangerous. Cyberattacks are large, complex, and well-prepared. In particular, the attack targets are gradually shifting from individual targets to those of large economic groups or, more seriously, to critical information systems of countries. In particular, many types of dangerous malware can “overtake” most anti-virus software today. A straightforward reason, hackers write specialized malicious code to attack only a specific business or organization. These malicious codes do not need to be highly contagious; instead, they are written in a very sophisticated way to exploit existing security holes in the enterprise’s information technology system, thereby take control of the system, steal valuable information, or take down the entire system when the need arises. There have been many good examples given in the media over time.

In particular, malware has often gotten into enterprise systems based on unknown attack patterns (Zero day – Attack), making traditional security defenses, although performing very well with their missions, can’t even resist in time. The purpose of the attacks has changed; no longer merely destructive malicious code that spreads in the system and is easily removed by anti-virus software; instead, there are targeted attacks stimulated by motives of unfair competition or personal gain; malicious codes are built with a much more specific and sophisticated goals.

Substantial IT systems are usually separate from external internet and intranet systems. The separate design and operation (without an internet connection) of critical systems aim to ensure the highest security and safety. However, there are still systems in the system, such as SCADA, IoT, reporting… These systems still require system upgrades or data exchange in or out. Therefore, businesses still allow employees, partners, and vendors to bring data from outside in the form of peripheral devices such as USB, CD/DVD, mobile, laptop, etc.

Thus, despite being designed and operated separately, critical areas are still easily attacked through malicious code penetrating from peripheral devices.

Controlling peripheral devices brought into critical areas becomes a major challenge for businesses. They are faced with the following questions:

  • How to ensure the peripheral devices brought in are safe and no longer the threat of malware?
  • Who is allowed to bring in or out, and what kind of data?
  • Control sensitive information when brought in or out?

Uses and functions of the solution:

MetaDefender Kiosk detects and stops all information security threats before the peripheral is brought into the critical area. Kiosk will be placed in front of security control entrances where employees or guests enter and carry peripheral devices that may contain malicious code.

MetaDefender Kiosk is trusted by organizations with the highest levels of security, such as energy plant facilities (oil and gas, power, nuclear), government agencies, and financial institutions. More than 98% of US nuclear facilities use the MetaDefender Kiosk, and today OPSWAT is the leading provider of malware detection and prevention solutions worldwide.

Operation process:

The scanning process to detect malware and clean peripherals is simple and fast, as shown below:

Types of peripherals supported:

  • USB devices
  • CDs/DVDs/Blu-ray
  • Card readers
  • SD cards
  • Floppy disks

Deployment model:

To prevent malware from entering the system through peripheral devices, all of these devices must be analyzed through a dedicated Kiosk.

To ensure easy compliance with malware control, Kiosk can be located in the following locations:

  • Security control gate in and out.
  • Operation room.
  • Server room.

Highlighted features:

  • Scanning malware with multiple engines (multi-scanning): MetaDefender Kiosk supports malware scanning with more than 30 anti-malware engines; this ensures increased malware detection thanks to signature and malware detection technology by many anti-malware vendors worldwide.
  • Data sanitization: The feature removes all components that may contain malicious code in the file, such as macros, embedded Flash or JavaScript code. This helps Kiosk completely remove potentially harmful content in the file, resist zero-day attacks, and return a completely clean and reliable file.
  • Vulnerability Assessment: Detects vulnerabilities in over 20,000 applications using a database of over 1 billion hashes. From there, it is easy to detect application vulnerabilities and prevent users from bringing in unpatched and vulnerable applications for hackers to exploit.
  • Data Loss Prevention (DLP): Supports scanning more than 30 file types to detect sensitive data that may enter or leave critical areas.
  • Update Signature offline: Support to update signature database offline; no need to connect to the Internet.

Investment benefits:

With nearly 20 years of developing solutions for multi-scanning malware detection and data cleaning, OPSWAT is a trusted supplier for many organizations worldwide requiring specialized equipment to handle peripheral devices.

For critical areas, being hacked will cause huge financial losses, especially national security issues. With the MetaDefender Kiosk, critical areas of the business can be trusted entirely with peripheral devices when brought in. MetaDefender Kiosk blocks all threats of malware infection or the risk of network attacks through peripheral devices.


Our company always wishes to become a reliable partner and a leading supplier of equipment and solutions for the success of our customers. For more detailed information, please contact:

MITAS Hanoi Technology JSC

Address: 5th Floor, C’Land Building, No. 81 Le Duc Tho St., My Dinh 2 Ward, Nam Tu Liem Dist., Hanoi, Vietnam          

Web: https://mitas.vn  | Tel: (+84) 243 8585 111 | Email: sales@mitas.vn

The trust and support of our customers are a driving force and an invaluable asset to our company. We sincerely thank you./.

]]>
http://en.mitas.vn/information-security-cyber-security-metadefender-kiosk-solution-655/feed/ 0
[Information Security – Cyber Security] Prevent the risk of Zero-day malware attacking via email http://en.mitas.vn/information-security-cyber-security-prevent-the-risk-of-zero-day-malware-attacking-via-email-644/ http://en.mitas.vn/information-security-cyber-security-prevent-the-risk-of-zero-day-malware-attacking-via-email-644/#respond Wed, 29 Mar 2023 02:45:52 +0000 http://en.mitas.vn/?p=644 Currently, large organizations, including corporations, are being targeted by hacker groups, especially those from Eastern Europe and East Asia. Hacker groups carry out a series of email phishing campaigns, distributing hundreds of thousands of emails containing malicious code to organizations and businesses.

Solutions Purpose:

Currently, large organizations, including corporations, are being targeted by hacker groups, especially those from Eastern Europe and East Asia. Hacker groups carry out a series of email phishing campaigns, distributing hundreds of thousands of emails containing malicious code to organizations and businesses. When the user opens the email and the attachment, the malware will be activated and carry out activities that destroy the organization.

In recent times, targeted attacks with malware have caused significant damage to organizations such as:

  • A lot of information about the company’s customers and projects is stolen.
  • Ransomware types encrypt important information, causing damage up to tens of millions of USD.
  • Disruption of business activities.
  • Losing the image of the organization’s reputation to consumers, affecting the goals of business plans and strategies.

Organizations have equipped many security solutions; however, completely preventing malicious code, especially zero-day malware, has become a concern for many security managers. Current solutions on the market, such as endpoint security or sandboxing, cannot bring peace of mind or safety to information technology systems. Hackers can easily create zero-day malware and bypass all security controls.

The purpose of documenting this solution is to provide Enterprises with a system to detect and prevent malicious code (especially zero-day malware) in the most effective way. With unique multi-scanning technology and CDR (completely disables zero-day malware), enterprises can be assured that malicious code cannot penetrate via email.

Overview of MetaDefender solution technology:

OPSWAT has developed a malware attack prevention platform, Metadefender, that does not rely on detection techniques. MetaDefender Platform is trusted by organizations with the highest levels of security, such as energy plant facilities (oil and gas, power, nuclear), government agencies, and financial institutions. More than 98% of US nuclear facilities use the Metadefender Platform, and today OPSWAT is the leading provider of malware detection and prevention solutions worldwide.

This platform helps enterprises detect and prevent threats from attacking through various channels such as email, web, BYOD, file copy from external devices and Cloud. With flexibility in workflow configuration, MetaDefender can effectively stop threats. MetaDefender uses a specialized technology – “data disinfection” (deep Content Disarm and Reconstruction – deep CDR) to remove all harmful components in the file, ensuring that the file, when reaching the user, is absolutely safe and has no risk of harm. To create more system security, in addition to the MetaDefender deep CDR platform, it also incorporates multi-scanning, vulnerability detection and data loss prevention (DLP) technologies.

Based on the MetaDefender platform, OPSWAT provides solutions to detect and prevent malware according to the following model:

Uses and functions of MetaDefender Email Security solution:

  • Preventing malicious emails that can bypass the Sandbox: With the evolution of malware types, they can easily bypass the Sandbox or anti-malware system available in Office 365 or G Suite. To effectively prevent malware (both known, unknown, or zero-day attacks), MetaDefender Email Security uses today’s market-leading technologies, multi-scanning and deep CDR to protect enterprise systems against malicious emails without affecting the performance of the email server. MetaDefender Email Security also uses the DLP feature to detect and prevent sensitive information from being blasted outside.
  • Second layer of defense for Email Security Gateway: Email security gateway offers a variety of ways to protect email, but it’s still not absolute. MetaDefender Email Security reinforces the email security gateway’s ability to detect and block malicious email with multi-scanning techniques (more than 30 AV engines, inheriting signature and heuristic malware detection methods, machine learning from experts that provides AV solutions) and deep CDR. With deployment model flexibility, MetaDefender Email Security can protect on-prem email or cloud email systems like Office 365 or G Suite.

Uses and functions of MetaDefender Email Security solution:

  • Preventing malicious emails that can bypass the Sandbox: With the evolution of malware types, they can easily bypass the Sandbox or anti-malware system available in Office 365 or G Suite. To effectively prevent malware (both known, unknown, or zero-day attacks), Metadefender Email Security uses today’s market-leading technologies, multi-scanning and deep CDR to protect enterprise systems against malicious emails without affecting the performance of the email server. MetaDefender Email Security also uses the DLP feature to detect and prevent sensitive information from being blasted outside.
  • Second layer of defense for Email Security Gateway: Email security gateway offers a variety of ways to protect email, but it’s still not absolute. MetaDefender Email Security reinforces the email security gateway’s ability to detect and block malicious email with multi-scanning techniques (more than 30 AV engines, inheriting signature and heuristic malware detection methods, machine learning from experts that provides AV solutions) and deep CDR. With deployment model flexibility, MetaDefender Email Security can protect on-prem email or cloud email systems like Office 365 or G Suite.

Highlighted features of MetaDefender Email Security:

  • “Disinfection” of malicious emails – deep CDR technology helps clean email content or attachments by completely removing components that could potentially harbor malware. The cleaned files will be sent to the recipient; then, the recipient can safely use them without worrying about malware threats.
  • Malware detection in emails – with multi-scanning technology (with more than 30 AV engines combining signature, heuristics, and machine learning methods), MetaDefender Email Security can quickly detect known or unknown malware as well as protect your system from the fastest malware outbreak.
  • High performance – MetaDefender Email Security is developed with malware detection and blocking technology without affecting email system performance. With an architecture developed for high-performance environments, MetaDefender Email Security can scale with any large email traffic system.

Investment Benefits:

With nearly 20 years of developing technologies for multi-scanning, CDR detecting and disabling malware, OPSWAT is a trusted supplier for many organizations and businesses worldwide with the demand for malware detection and prevention, especially zero-day malware.

By equipping the MetaDefender Platform in the security system and preventing malware through emails, businesses will be completely assured of preventing malicious code from attacking, avoiding the significant consequences of malicious code attacks, such as:

  • Leaks of vital information
  • Making unauthorized modifications to the information system
  • Data encryption and ransom demand
  • Interruption of the system’s operation
  • The image and reputation of the organization are degraded

Our company always wishes to become a reliable partner and a leading supplier of equipment and solutions for the success of our customers. For more detailed information, please contact:

MITAS Hanoi Technology JSC

Address: 5th Floor, C’Land Building, No. 81 Le Duc Tho St., My Dinh 2 Ward, Nam Tu Liem Dist., Hanoi, Vietnam          

Web: https://mitas.vn  | Tel: (+84) 243 8585 111 | Email: sales@mitas.vn

The trust and support of our customers are a driving force and an invaluable asset to our company. We sincerely thank you./.

]]>
http://en.mitas.vn/information-security-cyber-security-prevent-the-risk-of-zero-day-malware-attacking-via-email-644/feed/ 0
[Information Security – Cyber Security] Network access management solution (NAC) http://en.mitas.vn/information-security-cyber-security-network-access-management-solution-nac-636/ http://en.mitas.vn/information-security-cyber-security-network-access-management-solution-nac-636/#respond Tue, 28 Mar 2023 10:02:03 +0000 http://en.mitas.vn/?p=636 Nowadays, many enterprises allow external devices and BOYD devices to connect to critical operating networks. However, a large number of devices and the variety of connected devices bring businesses many challenges in managing security and safety.

Solution Overview:

Nowadays, many enterprises allow external devices and BOYD devices to connect to critical operating networks. However, a large number of devices and the variety of connected devices bring businesses many challenges in managing security and safety. Questions are posed to the security department to find solutions, such as:

  • How to manage which devices are connected and where?
  • How to know that the connected device meets the security standards?
  • How to block the connection of an unknown device while maintaining a normal experience for the devices that are allowed to connect?

Due to such challenges, the NAC solution helps automate the inspection of device security compliance and network access permission policies by collecting complete information and device status in real-time. Thereby, it meets the requirements of real-time device connection management and more flexible granular access policies.

NAC takes a simple approach and automates the authorization or blocking of device connections to the network, providing a convenient, simple user experience and minimal IT-assisted calls.

Specially designed with powerful features: visibility (complete device discovery and collection), security and governance, it brings a consistent experience to the users, including user identification throughout the entire network (switch and access point), network port protection, and real-time device security compliance testing. Policies are enforced upon device authentication and are constantly checked in real-time by the device’s status. Therefore, even if the device is authenticated and connected to the network, any device that violates the policy will be immediately disconnected. In addition, if the device is disconnected, the user will receive a message from the screen (via the web page) specifying why the connection is disconnected and the steps to manually re-access the network. Users can do it themselves without IT guidance.

Uses and functions of NAC solutions:

  • NAC helps automate testing of device security compliance and access policies (based on identity/permission, device type, location, and ownership).
  • NAC collects real-time insights and compares device contexts to make accurate and immediate policy decisions.
  • NAC helps to assess the correlation of device information and user identifiers (based on the time and connected network segments) and then share this information with third parties’ security solutions such as Firewalls, Web Firewalls, SIEM… with the aim of managing the device in a consistent, accurate and secure way.

Solution features:

NAC can be integrated into the network according to Layer2/Layer3 or a combination of both.

The features of the solution are as the following:

  • Port Level Control
  • Role-Based Access Control
  • Agentless Device Profiling
  • Acceptable User Policy (AUP) Enforcement
  • Custom Policy Builder
  • Guest and IOT Self Registration
  • Flexible Network Integration Options
  • Contextual Intelligence Publishing
  • Application Usage Policies

  • RADIUS server – NAC can act as a RADIUS server or act as a proxy to an existing RADIUS server in the system.
  • Device Remediation (self-remediation) – NAC gives specific instructions for devices that are not complying with any technical standards and how to fix them so that users can do it themselves without the intervention of the IT helpdesk.
  • Agentless Device Profiling (collect device information without Agent) – collect information about connected devices such as device type, manufacturer, operating system and other attributes.
  • Register IoT devices – Support to allow registered IoT devices to connect to the network and customize policies so that these devices have the lowest access to limit security vulnerabilities.
  • Guest User Self-Registration – The web portal supports Guests’ self-registration in a simple and fast way.
  • 24×7 Proactive Monitoring and Technical Support – technical team supports remote administration, daily backup, software upgrade, problem identification and resolution.

Solutions’ Benefits:

NAC provides a simple and effective user experience that helps solve the challenges of businesses in ensuring the security of devices connected to the network. The benefits brought:

  • Ensure security and clarity in real-time: The solution detects and collects complete information on connected or blocked devices on both wired and wireless networks; Real-time policy enforcement and compliance testing with mobile devices, Windows, and MacOS.
  • Flexible enforcement policies: The solution supports RADIUS-based policy enforcement without requiring VLAN changes and supports Layer 3 integration that does not require 802.1X authentication.
  • Convenient, simple user authentication: Support intuitive interface (easy to customize) for Guest, Vendor, and employees to self-register and grant access rights.
  • Contextual Intelligence: More comprehensive awareness of the device context in the network, sharing information with third-party security solutions such as SIEM, Firewalls, and IPS/IDS to automate the process of ensuring security in the enterprise.
  • Remote installation, training, deployment and support: Simple deployment solution that can support remote installation and deployment; support proactive monitoring 24×7, daily backup, software upgrade, problem detection and resolution.

Our company always wishes to become a reliable partner and a leading supplier of equipment and solutions for the success of our customers. For more detailed information, please contact:

MITAS Hanoi Technology JSC

Address: 5th Floor, C’Land Building, No. 81 Le Duc Tho St., My Dinh 2 Ward, Nam Tu Liem Dist., Hanoi, Vietnam          

Web: https://mitas.vn  | Tel: (+84) 243 8585 111 | Email: sales@mitas.vn

The trust and support of our customers are a driving force and an invaluable asset to our company. We sincerely thank you./.

]]>
http://en.mitas.vn/information-security-cyber-security-network-access-management-solution-nac-636/feed/ 0
[Information Security – Cyber Security] Decentralized solution to authentication using data http://en.mitas.vn/information-security-cyber-security-decentralized-solution-to-authentication-using-data-629/ http://en.mitas.vn/information-security-cyber-security-decentralized-solution-to-authentication-using-data-629/#respond Tue, 28 Mar 2023 09:17:20 +0000 http://en.mitas.vn/?p=629 The solution helps administrators to set up how many system resources can be exploited according to each user level. All users can only use resources they are authorized to use and cannot use the resources that are outside the authorization level.

Functions:

Nowadays, with the trend of technology significantly developing as storms, equipment and systems for scientific research are increasingly expensive and maintenance costs are increasingly costly. The model of a shared laboratory and research center was found to meet scientific research needs with economic investment and increase scientific research productivity. In the shared model, users have the ability to use services and resources through the internet from any location and any device, and users can directly access cloud resources quickly. Due to the increasingly sophisticated risks and cyberattacks, we urgently need a simple and cost-effective solution that gives users quick access to the data to get the job done while ensuring that data security and threat prevention policies are strictly enforced.

A data-driven authentication decentralized solution is built to give users access to the specific applications and resources they are authorized to use, no matter where the user is deployed. The solution helps administrators to set up how many system resources can be exploited according to each user level. All users can only use resources they are authorized to use and cannot use the resources that are outside the authorization level.

System deployment model:

 

All users’ machines that want to access and use system data must pass the Access Gateway network node. This is like a lock to protect system resources equipped with today’s world’s most advanced authentication and security technologies.

The solution is software installed directly on the server that controls the entire system’s resources.

Technical features:

  • Replace traditional VPN
  • Multi-cloud support
  • Ensure compliance with connected device security
  • Connect device and application directly, not route traffic outside the public cloud
  • Simple and fast deployment in 01 or 02 hours

Benefits:

  • More security, less load on FW, save the cost of upgrading FW and VPN license
  • 01 on-prem and on-cloud system protection solution
  • Hackers don’t take advantage of endpoints to attack businesses
  • Ensure data privacy
  • Save on international bandwidth costs
  • Fast and secure deployment for remote workers

Our company always wishes to become a reliable partner and a leading supplier of equipment and solutions for the success of our customers. For more detailed information, please contact:

MITAS Hanoi Technology JSC

Address: 5th Floor, C’Land Building, No. 81 Le Duc Tho St., My Dinh 2 Ward, Nam Tu Liem Dist., Hanoi, Vietnam          

Web: https://mitas.vn  | Tel: (+84) 243 8585 111 | Email: sales@mitas.vn

The trust and support of our customers are a driving force and an invaluable asset to our company. We sincerely thank you./.

]]>
http://en.mitas.vn/information-security-cyber-security-decentralized-solution-to-authentication-using-data-629/feed/ 0
[Information Security – Cyber Security] Prevent malware from entering through documents uploaded on online public services http://en.mitas.vn/information-security-cyber-security-prevent-malware-from-entering-through-documents-uploaded-on-online-public-services-618/ http://en.mitas.vn/information-security-cyber-security-prevent-malware-from-entering-through-documents-uploaded-on-online-public-services-618/#respond Tue, 28 Mar 2023 08:42:44 +0000 http://en.mitas.vn/?p=618 As malware is significantly rising, malware analysts and incident response teams face an ever-greater number of malware incidents to analyze. OPSWAT delivers an Advanced Threat Prevention platform that detects and blocks malware quickly and accurately with very few false positive results.

Fast and accurate malware prevention platform (especially zero-day malware):

As malware is significantly rising, malware analysts and incident response teams face an ever-greater number of malware incidents to analyze. OPSWAT delivers an Advanced Threat Prevention platform that detects and blocks malware quickly and accurately with very few false positive results. MetaDefender also easily integrates into the organization’s existing application systems via API.

OPSWAT’s malware detection and prevention technologies:

With nearly 20 years of operation in the field of anti-malware attacks and trusted in more than 98% of nuclear facilities in the US, OPSWAT has the following specific technologies:

  • Scanning malware with multiple engines (Multi-scanning): Multi-scanning supports malware scanning with more than 30 anti-malware engines from the world’s leading anti-virus (AV) solution providers, using signature technologies, heuristics and machine learning to ensure the highest malware detection rate.
Anti-malware in the system of METADEFENDER ADVANCED THREAT PLATFORM
  • Benefits:
    • Malware detection rate is more than 99% with platforms with 20 or more anti-malware engines.
    • With anti-malware engines covering geographical regions worldwide, the specific engines in each geographical region, such as Eastern Europe, East Asia, North America, etc., will quickly detect malicious codes and malware by local hackers created. For example, Kaspersky will detect malware from Eastern Europe early; AhnLab will detect malware from Korea and Japan early.
  • Eliminating zero-day malware – Deep CDR technology: The feature removes all components that may contain malware in the file, such as macros, embedded Flash, or JavaScript code. With the ability to support more than 100 file types (including all file types used in daily work such as MS Office, pdf, and images), Metadefender completely removes potentially harmful content in files, against zero-day attacks, and returns files that are completely clean and reliable.
Deep Content Disarm and Reconstruction (CDR)

Solution Application:

  • Prevent malicious code/ malware attacks from online files uploaded on the public service portal: By integrating APIs, online files (jpeg, png, pdf…) will be sent through the Metadefender Platform system to scan and clean malicious code before saving to the public service application systems.

  • Prevent malicious code from being sent via email: Email attachments will be scanned and cleaned by Metadefender Platform before reaching the recipient.

 


Our company always wishes to become a reliable partner and a leading supplier of equipment and solutions for the success of our customers. For more detailed information, please contact:

MITAS Hanoi Technology JSC

Address: 5th Floor, C’Land Building, No. 81 Le Duc Tho St., My Dinh 2 Ward, Nam Tu Liem Dist., Hanoi, Vietnam          

Web: https://mitas.vn  | Tel: (+84) 243 8585 111 | Email: sales@mitas.vn

The trust and support of our customers are a driving force and an invaluable asset to our company. We sincerely thank you./.

]]>
http://en.mitas.vn/information-security-cyber-security-prevent-malware-from-entering-through-documents-uploaded-on-online-public-services-618/feed/ 0