Your servers, workstations and mobile devices are being targeted by hackers
A terminal is used to access or provide network resources and services such as files, applications, data and printers. A terminal can be a workstation, a server, a laptop or a smartphone. Because these devices enable users to interact with information systems, they are potential targets for hackers and sources of vulnerabilities.
With advanced techniques and tactics for circumventing existing security measures, it is becoming impossible to protect terminals with anti-virus and firewall software alone. Best practice recommends a defence-in-depth approach. At CAPTOSEC, this approach is used to effectively reduce endpoint security risks.
Our services
To protect your terminals, we use, implement and monitor the following security controls
- Anti-virus software (EDR/XDR)
- Anti-malware software
- Application of patches
- Compliance and verification tools
- Host-based firewall
- Host-based intrusion detection and prevention
- Backup and recovery
- Encryption of data at rest
We use the following technologies and solutions to protect your terminals against infection
- Anti-virus software (EDR/XDR)
- Anti-malware software
- Patch enforcement
- Host-based firewall
- Host-based intrusion detection and prevention
- Backup and restore (i.e., ransomware)
- Data protection
- Protected workstations, laptops and mobile devices
- Hardened servers and security devices
- Data storage protected by encryption and backup
- Best practice guides
- User training and awareness