Beruflich Dokumente
Kultur Dokumente
IKON Corporate Security Services provides organizations with the ability to reduce
exposure and manage threats by providing a comprehensive suite of security services,
designed to manage the Confidentiality, Integrity and Availability of your data and
services.
IKON VM is easily scalable to cover organizations of all sizes and distributed across
multiple geographical locations and sites.
Features
Automate vulnerability identification
Prioritize remediation based on risk to business operations
Document regulatory compliance via automated agent-less auditing
Comprehensive vulnerability KnowledgeBase incorporates thousands of unique checks
Six-sigma accuracy of detection
After-hours, scheduled remediation performed by certified experts
”
Ensure compliance with laws, regulations and corporate security policies
strategic projects. Measurable ROI with lower OPEX and no CAPEX
— Frederic Jesupret Monthly reports with full status and service summary
Telecom & Security Manager Flexible customer-oriented pricing structure
Mondial Assistance, France Alignment of IT & core business objectives
Business Dashboards
IKON PQM provides a portal for conducting online audit and reporting 5 RE
PORT 3
activities as well as managing and maintaining enterprise progress in End users Keross Security Operations Center
Report analysis, mitigation strategy
terms of regulations, policies and procedures. Progress and performance Remediation of vulnerabilities
can be measured against industry indices and benchmarking, supporting Level I, II, III Support
Additional Services
• Web Application Scanning • Mail Security, Archiving Services • Log Management
WAS provides automated crawling & testing for custom web IKON Email Security Services provide high protection IKON SIEM is a comprehensive digital security platform that
applications to identify most vulnerabilities such as those against E-mail, Spam, Virus alongwith Business Continuity uses alarms and indicators to manage & prevent security
in the OWASP Top 10 and WASC Threat Classification, with live archiving, Bandwidth management without risks by collecting & storing logs to analyse any type of
including SQL Injection and Cross-Site Scripting. hardware or software. event.