infosec.ae Open in urlscan Pro
18.159.9.113  Public Scan

Submitted URL: http://infosec.ae/
Effective URL: https://infosec.ae/
Submission: On February 13 via api from FI — Scanned from FI

Form analysis 0 forms found in the DOM

Text Content

 * 
 * 
 * 

+(971) 4 299 2757info@infosec.ae

Toggle navigation

 * HOME PAGE
 * WHO IS US?
   * Our Story
   * Career
   * Announcements
 * SOLUTIONS
   * INFORMATION SECURITY
     * Security Information Event Management and Correlation System
     * Security Automation
     * Security Configuration and Compatibility
     * User Behavior and Analysis
     * Corporate Security Operation and Instrumentation
     * Data Encryption and Device Encryption
     * Cyber Risk Scoring
     * Application Security
     * Threat Hunt with Artificial Intelligence
   * NETWORK SECURITY
     * Network Security Management
     * Anti Ransomware Solutions
     * Cloud Security Management
     * DNS and DHCP Security and Adress Management
     * Security Gap Management
     * Firewall – IPS / IDS
     * Malware Analysis and Detection
     * Endpoint Security Management
   * CONTENT SECURITY
     * Cloud Access Security Broker
     * DLP (Data Leak Prevention)
     * E-Mail Encryption and Web Security
     * Configuration Management
     * URL / Content Filtering and Gateway
     * Data Classification
 * SERVICES
   * Installation and Professional Services
   * Advanced Support
   * Support Plans
   * Manageable Security Services
   * Network Architecture and Revision
 * PARTNERS
   * AlgoSec
   * Boldon James
   * Checkmarx
   * Check Point
   * Cisco Sourcefire
   * Docguard
   * Forcepoint
   * Hysolate
   * Infoblox
   * Micro Focus Arcsight
   * ObserveIT
   * Palo Alto
   * Proofpoint
   * Pulse Secure
   * Rapid7
   * Recorded Future
   * Tripwire
   * Vectra
   * VMRay
 * ACADEMY
   * Our Training Calendar
   * (ISC)² CISSP Training
   * Check Point Certificate Programs
   * Forcepoint Certificate Programs
   * Micro Focus ArcSight ESM Training
   * Linux Security Training
   * DNS Security Training
   * Intern Training Program
 * CONTACT




NETWORK SECURITY MANAGEMENT


THREAT HUNT WITH ARTIFICIAL INTELLIGENCE


CORPORATE SECURITY OPERATION AND INSTRUMENTATION


CLOUD ACCESS SECURITY BROKER


APPLICATION SECURITY


SECURITY CONFIGURATION AND COMPATIBILITY


ANTI RANSOMWARE SOLUTIONS


USER BEHAVIOR AND ANALYSIS


DATA ENCRYPTION AND DEVICE ENCRYPTION


ENDPOINT SECURITY MANAGEMENT


SECURITY AUTOMATION


CYBER RISK SCORING


SECURITY INFORMATION EVENT MANAGEMENT AND CORRELATION SYSTEM


CLOUD SECURITY MANAGEMENT


DNS AND DHCP SECURITY AND ADRESS MANAGEMENT


MALWARE ANALYSIS AND DETECTION


SECURITY GAP MANAGEMENT


E-MAIL ENCRYPTION AND WEB SECURITY


URL / CONTENT FILTERING AND GATEWAY


DLP (DATA LEAK PREVENTION)


CONFIGURATION MANAGEMENT


DATA CLASSIFICATION


INFOSEC INFORMATION SECURITY


PROVIDE COMPLETE SECURE BUSINESS CONTINUITY WITH
INTEGRATED, SOLUTION-ORIENTED AND EFFECTIVE CYBERSECURITY SOLUTIONS.










NETWORK SECURITY MANAGEMENT


THREAT HUNT WITH ARTIFICIAL INTELLIGENCE


CORPORATE SECURITY OPERATION AND INSTRUMENTATION


CLOUD ACCESS SECURITY BROKER


APPLICATION SECURITY


SECURITY CONFIGURATION AND COMPATIBILITY


ANTI RANSOMWARE SOLUTIONS


USER BEHAVIOR AND ANALYSIS


DATA ENCRYPTION AND DEVICE ENCRYPTION


ENDPOINT SECURITY MANAGEMENT


SECURITY AUTOMATION


CYBER RISK SCORING


SECURITY INFORMATION EVENT MANAGEMENT AND CORRELATION SYSTEM


CLOUD SECURITY MANAGEMENT


DNS AND DHCP SECURITY AND ADRESS MANAGEMENT


MALWARE ANALYSIS AND DETECTION


SECURITY GAP MANAGEMENT


E-MAIL ENCRYPTION AND WEB SECURITY


URL / CONTENT FILTERING AND GATEWAY


DLP (DATA LEAK PREVENTION)


CONFIGURATION MANAGEMENT


DATA CLASSIFICATION


INFOSEC INFORMATION SECURITY

Provide complete secure business continuity with
integrated, solution-oriented and effective cybersecurity solutions.








INFORMATION SECURITY SOLUTIONS

With our years of experience in information security, we meeting the security of
your corporate assets to operational excellence.

Learn More

NETWORK SECURITY SOLUTIONS

We work with a risk-oriented approach, taking into account the momentary
variability in network security, and take precautions against malicious attacks.

Learn More

CONTENT SECURITY SOLUTIONS

We value your corporate data and assets, and provide specific cyber security
measures so that your workflow can work fully integrated.

Learn More
prev
next


INFORMATION SECURITY SOLUTIONS

With our years of experience in information security, we meeting the security of
your corporate assets to operational excellence.

Learn More

NETWORK SECURITY SOLUTIONS

We work with a risk-oriented approach, taking into account the momentary
variability in network security, and take precautions against malicious attacks.

Learn More

CONTENT SECURITY SOLUTIONS

We value your corporate data and assets, and provide specific cyber security
measures so that your workflow can work fully integrated.

Learn More
prev
next



METNA PARTNER AWARDS
GROWTH PARTNER OF THE YEAR 2021
AWARD WINNER



Since 2012





Over 20 years

professional service experience



More than 165 solution partners in 13 countries





450.000

endpoint users









IBTECH – QNB FINANSBANK CREATED A SMART ORCHESTRATION WITH SOAR

INFOSEC’S CORTEX XSOAR SOLUTION IMPROVES THE INTEGRATION OF DISPARATE SECURITY
SYSTEMS.



Review the Report


SINCE 2012





OVER 20 YEAR
PROFESSIONAL SERVICE EXPERIENCE





MORE THAN 165 SOLUTION PARTNERS IN 13 COUNTRIES



450.000
endpoint users






WE INTRODUCE YOUR CORPORATE ASSETS TO OPERATIONAL EXCELLENCE

WITH OUR WIDE RANGE OF CYBER SECURITY SOLUTIONS, WE ANALYZE POTENTIAL RISKS
EARLY AND CREATE COMPLETE LAYERS OF PROTECTION FOR THE CONTINUITY OF THE
WORKFLOW.

 * Information Security
 * Network Security
 * Content Security

INFORMATION SECURITY

SECURITY INFORMATION EVENT MANAGEMENT AND CORRELATION SYSTEM

Learn More

SECURITY AUTOMATION

Learn More

SECURITY CONFIGURATION AND COMPATIBILITY

Learn More

USER BEHAVIOR AND ANALYSIS

Learn More

CORPORATE SECURITY OPERATION AND INSTRUMENTATION

Learn More

CYBER RISK SCORING

Learn More

DATA ENCRYPTION AND DEVICE ENCRYPTION

Learn More

APPLICATION SECURITY

Learn More

THREAT HUNT WITH ARTIFICIAL INTELLIGENCE

Learn More

NETWORK SECURITY

NETWORK SECURITY MANAGEMENT

Learn More

ANTI RANSOMWARE SOLUTIONS

Learn More

CLOUD SECURITY MANAGEMENT

Learn More

DNS AND DHCP SECURITY AND ADRESS MANAGEMENT

Learn More

SECURITY GAP MANAGEMENT

Learn More

FIREWALL - IPS / IDS

Learn More

MALWARE ANALYSIS AND DETECTION

Learn More

ENDPOINT SECURITY MANAGEMENT

Learn More



CONTENT SECURITY

CLOUD ACCESS SECURITY BROKER

Learn More

DLP (DATA LEAK PREVENTION)

Learn More

E-MAIL ENCRYPTION AND WEB SECURITY

Learn More

CONFIGURATION MANAGEMENT

Learn More

URL / CONTENT FILTERING AND GATEWAY

Learn More

DATA CLASSIFICATION

Learn More




WE INTRODUCE YOUR CORPORATE ASSETS TO OPERATIONAL EXCELLENCE

WITH OUR WIDE RANGE OF CYBER SECURITY SOLUTIONS, WE ANALYZE POTENTIAL RISKS
EARLY AND CREATE COMPLETE LAYERS OF PROTECTION FOR THE CONTINUITY OF THE
WORKFLOW.

 * Information Security
 * Network Security
 * Content Security

INFORMATION SECURITY

SECURITY INFORMATION EVENT MANAGEMENT AND CORRELATION SYSTEM

Learn More

SECURITY AUTOMATION

Learn More

SECURITY CONFIGURATION AND COMPATIBILITY

Learn More

USER BEHAVIOR AND ANALYSIS

Learn More

CORPORATE SECURITY OPERATION AND INSTRUMENTATION

Learn More

CYBER RISK SCORING

Learn More

DATA ENCRYPTION AND DEVICE ENCRYPTION

Learn More

APPLICATION SECURITY

Learn More

THREAT HUNT WITH ARTIFICIAL INTELLIGENCE

Learn More

NETWORK SECURITY

NETWORK SECURITY MANAGEMENT

Learn More

ANTI RANSOMWARE SOLUTIONS

Learn More

CLOUD SECURITY MANAGEMENT

Learn More

DNS AND DHCP SECURITY AND ADRESS MANAGEMENT

Learn More

SECURITY GAP MANAGEMENT

Learn More

FIREWALL - IPS / IDS

Learn More

MALWARE ANALYSIS AND DETECTION

Learn More

ENDPOINT SECURITY MANAGEMENT

Learn More



CONTENT SECURITY

CLOUD ACCESS SECURITY BROKER

Learn More

DLP (DATA LEAK PREVENTION)

Learn More

E-MAIL ENCRYPTION AND WEB SECURITY

Learn More

CONFIGURATION MANAGEMENT

Learn More

URL / CONTENT FILTERING AND GATEWAY

Learn More

DATA CLASSIFICATION

Learn More




JOIN OUR EVENT




16 JANUARY 2020


RADISSON BLU BOSPHORUS


2020 SECURITY AGENDA WITH CHECK POINT


Join Event



FOLLOW INFOSEC


INFOSEC ACADEMY

We train future experts with our cyber security literature covering a wide range
of fields.


Join InfoSEC Academy


ANNOUNCEMENTS

We follow the informatics world up to date and inform our users against the
latest risks.


Follow Latest Announcements


BLOG

We describe cyber security with blog posts that you can increase your personal
equipment.


Read Blog Posts



FOLLOW INFOSEC


INFOSEC ACADEMY

GWe train future experts with our cyber security literature covering a wide
range of fields.


Join InfoSEC Academy


ANNOUNCEMENTS

We follow the informatics world up to date and inform our users against the
latest risks.


Follow Latest Announcements


BLOG

We describe cyber security with blog posts that you can increase your personal
equipment.


Read Blog Posts

 * Our Story
 * Career
 * Support Plans
 * Contact

 * 
 * 
 * 

 * Information Security Solutions
 * Network Security Solutions
 * Content Security Solutions

 * AlgoSec
 * Boldon James
 * Check Point
 * Cisco Sourcefire
 * Forcepoint
 * Infoblox
 * Micro Focus ArcSight
 * ObserveIT

 * Palo Alto
 * Proofpoint
 * Pulse Secure
 * Rapid7
 * Recorded Future
 * Tripwire
 * Vectra
 * VMRay

DUBAI

Dubai Silicon Oasis, P.O.BOX: 6009, U.A.E.

 

ISTANBUL

Merdivenköy Mah. Nur Sok. No:1/A BUSINESS İSTANBUL A Blok Kat:13 Daire:127
PK:34732
Kadıköy / ISTANBUL

 

ANKARA

İncek Mah. Turgut Özal Bulvarı 69/7
Gölbaşı / ANKARA