secu.dk
Strong Authentication
http://www.secu.dk/index.php/solutions/strong-authentication
Granting access to the corporate network, are typically required by users anytime and anywhere. It does provide the users with flexibility and mobility, which is in many organizations expected of them. At the same time, it does create challenges for the IT department, as users passwords could be exposed to someone sitting next to you on the train, when waiting to board an airplane or any other public spaces. Integrates with a wide variety of applications and infrastructure devices.
secu.dk
Endpoint Security
http://www.secu.dk/index.php/solutions/endpoint-security
Where is the weakest link in your infrastructure? If we ignore the human factor, it could easily be the endpoints (laptops, mobile devices, etc). They typically tend to run a multitude of applications and services, which in nature opens up the device for a high number of vulnerabilities than a closed down server. Protection of endpoints have developed alot the past years, and the security solutions should now fight off malware, protect confidential information on the hard drive and much more.
secu.dk
Professional Security Services
http://www.secu.dk/index.php/services/professional
Agent-Based Cyber Threat Assessment. Professional Security Services provides in depths analysis, knowledge and recommendations of critical areas in your infrastructure. At the moment we provide the following assessments. Agent-Based Cyber Threat Assessment.
secu.dk
News
http://www.secu.dk/index.php/news
At Secu we constantly strive to be up-to-date with the latest news about IT security. We follow developments in IT security close, and stay updated on news from our customers and partners. Subscribe to Secus monthly newsletter here:. May 25, 2016. Nessus and Secret Server. Contact Secu if you would like to know more about Nessus and Secret Server. April 07, 2016. Vulnerability scans when you need it! March 20, 2016. Trend Micro: A leader in Anti-Virus. March 02, 2016. Secu has contributed to improving Bl...
secu.dk
WAN Optimization
http://www.secu.dk/index.php/solutions/wan-optimization
How can you accelerate critical applications without adding more bandwidth? There are no restrictions on where it is possible to implement WAN Optimization. It could be in the data center, in a branch office or even at the mobile workforce. No need to upgrade bandwidth. Optimize poorly written protocols. Accelerate business critical applications.
secu.dk
VPN
http://www.secu.dk/index.php/solutions/vpn
A VPN (Virtual Private Network) is an additional network built on existing untrusted network. The purpose is typically to offer a secure and governed expansion of the internal network across an untrusted network - such as the internet. There are usually two different use cases, when considering VPN: Site2Site and Remote Access. Site2Site and Remote VPN are used when inter-connecting a remote branch office over the Internet. No need to upgrade bandwidth. Optimize poorly written protocols.
secu.dk
Home
http://www.secu.dk/index.php
Improve your IT security solutions. Secu design and implement highly available and specialized IT security solutions for global businesses. We thrive when things get complicated, and our ambition is to make IT security look easy for you. Send us an email and we'll get back to you as soon as possible.
secu.dk
SIEM
http://www.secu.dk/index.php/solutions/siem
Attacks from hackers are becoming more and more sophisticated each year. This leaves companies with increased costs, due to system crashes, loss of confidential data, bad publicity, customer uncertainty, or lost market share. The most effective way to know when you have been attacked is to use a SIEM solution (Security Information and Event Management).
secu.dk
Web Security
http://www.secu.dk/index.php/solutions/web-security
Protection against the increase of sophisticated threats from the Internet, has become a "must-have" in any private organization, government agency and of course consumers as well. Though Web Security is not a new security concept, the complexity has increased in the current attacks. Therefore you need a solution, which reduces the complexity and delivers the required protection to users across the organization. Enforce company security policy regarding Internet access. Control instant messaging traffic.