Home > Solutions
Automated Systems Holdings Ltd.
Information Security
 
Security Solution

No serious business can tolerate an unsecured IT environment that is susceptible to intrusion, hackers and unsolicited content and spam attacks. Complying with international security standards, Automated’s certified security professionals have conducted comprehensive assessment of risk analysis and recommended efficient security measures for various industries. By prioritizing your business objectives, we design cost-effective security measures to help safeguard your critical network resources against network integrity and information threats.

Firewall Solution

A firewall is the most commonly deployed security gateway among enterprises. It acts as the first line of defense to secure network security. It helps to track and control communications, deciding whether to allow, reject or encrypt communications. Firewalls have been increasingly used to protect sensitive portions of LANs and individual personal computers.

VPN Solution

A virtual private network (VPN) provides the most cost-effective way to inter-connect branch offices by public network. The VPN is used widely by enterprises to create a secured and transparent access infrastructure that spans across large geographic areas, providing site-to-site connections to branch offices and allowing mobile users to dial up to company LANs.

Antivirus Solution

An antivirus solution protects computing programs and data from the single greatest threat to the network — the computer virus.

IDS Solution

By monitoring network traffic proactively, watching for suspicious activity and notifying customers of an attack on a network or computer system, an intrusion detection system (IDS) solution enhances firewall protection. There are two types of IDS: Network IDS (NIDS) and Host IDS (HIDS). NIDS is designed to support multiple hosts, whereas HIDS is set up to detect illegal actions within the host. Most IDS programs use signatures of known cracker attempts to signal and alert.

Single Sign-on Solution

Single sign-on allows users to log on once to a network and be able to access all authorized resources within the enterprise. It accepts the user’s name and password and logs on automatically to all appropriate servers.

Two-Factor Authentication Solution

Two-factor authentication provides a more reliable level of user authentication than a reusable password. It can identify who is accessing sensitive networked information assets. Two-factor authentication requires users to identify themselves with two unique factors — password/PIN and Token/Smartcard — before access can be granted.

For enquiries, please contact us.


 
 
© 2014 Automated Systems Holdings Limited | Legal Disclaimer | Privacy Policy