IT SECURITY EXPERT
Les pirates profitent de cette période d’inquiétude liée à la pandémie et à ses répercussions sur les entreprises et l’emploi pour recruter...
La journée de la Femme, qui a lieu tous les ans le 8 Mars, est une date importante pour I-TRACING qui, depuis sa création, encourage les femmes à...
I-TRACING IT SECURITY EXPERT
For more than 14 years, I-TRACING has been helping its clients to manage cybersecurity compliance, risks, incidents, remediation and prevention.
In the future, we will always be committed to support our clients to digitalize securely and safely take profit from the Internet revolution.
• CyberSOC (Security Operation Center), CSIRT, Threat Intelligence
• Incident Detection, Advanced Breach Detection and Remediation
• Log collection, storing and Security Information & Event Management (SIEM)
• Information leakage detection and surveillance, Dark & Deep Web data-leakage surveillance
• Cybersecurity behaviour analysis, cyber-data scientists
• Legal compliance: LPM, GDPR, CNIL, ANSSI, PCI-DSS, DSP-2, SOX, HIPAA, ARJEL, ISO 2700x, RGS, HDS (Health data hosting regulations)
• Security policies definition and control
• Compliance control for network, systems and security infrastructure (firewalls, VLANs, etc.)
• End-to-end visibility into operational health of critical IT and business services
• Data Protection: data governance, data classification, cloud security)
• Identity Access Management, authentication, biometric authentication, access control
• Payments transactions digital signature, SSO/Web SSO solutions
• FIM (File Integrity monitoring), Directory Services Protection & Compliance
• Vulnerability monitoring, scanning, policy enhancement and control
• APT (Advanced Persistent Threat) protection: malware, ransomware
• Email protection: email encryption, malware detection, sandboxing, secure messaging
• Anti-DDoS protection, Advanced Threat Protection
• Application security and performance (DB monitoring, WAF, APM)
• Code security analysis, Application Security Testing, SecurDevOpps, bootkits protection
• Endpoint, Mobile & Web Application Security, Dockers architecture & implementation security
• PKI-based applications and infrastructures development and engineering
• Cyberprotection of Bigdata infrastructures and business critical implementation
• ICS (Industrial Control Systems) cyber security
• Internet of Things security: FW, encryption, DDoS protection, data leakage, spoofing, etc.
• Security assessment & remediation of SCADA-type systems (Supervisory Control & Data Acquisition)
• Rebond & PAM solutions for industrial protection for maintenance, super-users, etc.
• OS-hardening, IDS detection, VPN, Identity Access Management, traceability & SCADA logs
• Cloud security compliance, security policies
• CASB (Cloud Application Security Broker) high-level design & solution engineering
• Digital Transformation security, corporate social networks protection, business workflow hardening, etc
• Corporate shadow IT identification, shadow data tagging and protection
• Privileged Access Management (PAM)
• Big Data for Cyber Security: logs and Machine Data Analysis based on ELK & Hadoop tools
• Deep Packet Inspection (DPI) for critical applications end-to-end user visibility
• Specific fraud-tracking applications development for different corporate environments such as retail, online gambling, telco, banking & insurance
Are you excited about new technologies linked to cyber security and traceability of information? Then ...
I-TRACING : An independent company recognized expert in IT security for more than 14 years.