infosec.ae
Open in
urlscan Pro
18.159.9.113
Public Scan
Submitted URL: http://infosec.ae/
Effective URL: https://infosec.ae/
Submission: On February 13 via api from FI — Scanned from FI
Effective URL: https://infosec.ae/
Submission: On February 13 via api from FI — Scanned from FI
Form analysis
0 forms found in the DOMText Content
* * * +(971) 4 299 2757info@infosec.ae Toggle navigation * HOME PAGE * WHO IS US? * Our Story * Career * Announcements * SOLUTIONS * INFORMATION SECURITY * Security Information Event Management and Correlation System * Security Automation * Security Configuration and Compatibility * User Behavior and Analysis * Corporate Security Operation and Instrumentation * Data Encryption and Device Encryption * Cyber Risk Scoring * Application Security * Threat Hunt with Artificial Intelligence * NETWORK SECURITY * Network Security Management * Anti Ransomware Solutions * Cloud Security Management * DNS and DHCP Security and Adress Management * Security Gap Management * Firewall – IPS / IDS * Malware Analysis and Detection * Endpoint Security Management * CONTENT SECURITY * Cloud Access Security Broker * DLP (Data Leak Prevention) * E-Mail Encryption and Web Security * Configuration Management * URL / Content Filtering and Gateway * Data Classification * SERVICES * Installation and Professional Services * Advanced Support * Support Plans * Manageable Security Services * Network Architecture and Revision * PARTNERS * AlgoSec * Boldon James * Checkmarx * Check Point * Cisco Sourcefire * Docguard * Forcepoint * Hysolate * Infoblox * Micro Focus Arcsight * ObserveIT * Palo Alto * Proofpoint * Pulse Secure * Rapid7 * Recorded Future * Tripwire * Vectra * VMRay * ACADEMY * Our Training Calendar * (ISC)² CISSP Training * Check Point Certificate Programs * Forcepoint Certificate Programs * Micro Focus ArcSight ESM Training * Linux Security Training * DNS Security Training * Intern Training Program * CONTACT NETWORK SECURITY MANAGEMENT THREAT HUNT WITH ARTIFICIAL INTELLIGENCE CORPORATE SECURITY OPERATION AND INSTRUMENTATION CLOUD ACCESS SECURITY BROKER APPLICATION SECURITY SECURITY CONFIGURATION AND COMPATIBILITY ANTI RANSOMWARE SOLUTIONS USER BEHAVIOR AND ANALYSIS DATA ENCRYPTION AND DEVICE ENCRYPTION ENDPOINT SECURITY MANAGEMENT SECURITY AUTOMATION CYBER RISK SCORING SECURITY INFORMATION EVENT MANAGEMENT AND CORRELATION SYSTEM CLOUD SECURITY MANAGEMENT DNS AND DHCP SECURITY AND ADRESS MANAGEMENT MALWARE ANALYSIS AND DETECTION SECURITY GAP MANAGEMENT E-MAIL ENCRYPTION AND WEB SECURITY URL / CONTENT FILTERING AND GATEWAY DLP (DATA LEAK PREVENTION) CONFIGURATION MANAGEMENT DATA CLASSIFICATION INFOSEC INFORMATION SECURITY PROVIDE COMPLETE SECURE BUSINESS CONTINUITY WITH INTEGRATED, SOLUTION-ORIENTED AND EFFECTIVE CYBERSECURITY SOLUTIONS. NETWORK SECURITY MANAGEMENT THREAT HUNT WITH ARTIFICIAL INTELLIGENCE CORPORATE SECURITY OPERATION AND INSTRUMENTATION CLOUD ACCESS SECURITY BROKER APPLICATION SECURITY SECURITY CONFIGURATION AND COMPATIBILITY ANTI RANSOMWARE SOLUTIONS USER BEHAVIOR AND ANALYSIS DATA ENCRYPTION AND DEVICE ENCRYPTION ENDPOINT SECURITY MANAGEMENT SECURITY AUTOMATION CYBER RISK SCORING SECURITY INFORMATION EVENT MANAGEMENT AND CORRELATION SYSTEM CLOUD SECURITY MANAGEMENT DNS AND DHCP SECURITY AND ADRESS MANAGEMENT MALWARE ANALYSIS AND DETECTION SECURITY GAP MANAGEMENT E-MAIL ENCRYPTION AND WEB SECURITY URL / CONTENT FILTERING AND GATEWAY DLP (DATA LEAK PREVENTION) CONFIGURATION MANAGEMENT DATA CLASSIFICATION INFOSEC INFORMATION SECURITY Provide complete secure business continuity with integrated, solution-oriented and effective cybersecurity solutions. INFORMATION SECURITY SOLUTIONS With our years of experience in information security, we meeting the security of your corporate assets to operational excellence. Learn More NETWORK SECURITY SOLUTIONS We work with a risk-oriented approach, taking into account the momentary variability in network security, and take precautions against malicious attacks. Learn More CONTENT SECURITY SOLUTIONS We value your corporate data and assets, and provide specific cyber security measures so that your workflow can work fully integrated. Learn More prev next INFORMATION SECURITY SOLUTIONS With our years of experience in information security, we meeting the security of your corporate assets to operational excellence. Learn More NETWORK SECURITY SOLUTIONS We work with a risk-oriented approach, taking into account the momentary variability in network security, and take precautions against malicious attacks. Learn More CONTENT SECURITY SOLUTIONS We value your corporate data and assets, and provide specific cyber security measures so that your workflow can work fully integrated. Learn More prev next METNA PARTNER AWARDS GROWTH PARTNER OF THE YEAR 2021 AWARD WINNER Since 2012 Over 20 years professional service experience More than 165 solution partners in 13 countries 450.000 endpoint users IBTECH – QNB FINANSBANK CREATED A SMART ORCHESTRATION WITH SOAR INFOSEC’S CORTEX XSOAR SOLUTION IMPROVES THE INTEGRATION OF DISPARATE SECURITY SYSTEMS. Review the Report SINCE 2012 OVER 20 YEAR PROFESSIONAL SERVICE EXPERIENCE MORE THAN 165 SOLUTION PARTNERS IN 13 COUNTRIES 450.000 endpoint users WE INTRODUCE YOUR CORPORATE ASSETS TO OPERATIONAL EXCELLENCE WITH OUR WIDE RANGE OF CYBER SECURITY SOLUTIONS, WE ANALYZE POTENTIAL RISKS EARLY AND CREATE COMPLETE LAYERS OF PROTECTION FOR THE CONTINUITY OF THE WORKFLOW. * Information Security * Network Security * Content Security INFORMATION SECURITY SECURITY INFORMATION EVENT MANAGEMENT AND CORRELATION SYSTEM Learn More SECURITY AUTOMATION Learn More SECURITY CONFIGURATION AND COMPATIBILITY Learn More USER BEHAVIOR AND ANALYSIS Learn More CORPORATE SECURITY OPERATION AND INSTRUMENTATION Learn More CYBER RISK SCORING Learn More DATA ENCRYPTION AND DEVICE ENCRYPTION Learn More APPLICATION SECURITY Learn More THREAT HUNT WITH ARTIFICIAL INTELLIGENCE Learn More NETWORK SECURITY NETWORK SECURITY MANAGEMENT Learn More ANTI RANSOMWARE SOLUTIONS Learn More CLOUD SECURITY MANAGEMENT Learn More DNS AND DHCP SECURITY AND ADRESS MANAGEMENT Learn More SECURITY GAP MANAGEMENT Learn More FIREWALL - IPS / IDS Learn More MALWARE ANALYSIS AND DETECTION Learn More ENDPOINT SECURITY MANAGEMENT Learn More CONTENT SECURITY CLOUD ACCESS SECURITY BROKER Learn More DLP (DATA LEAK PREVENTION) Learn More E-MAIL ENCRYPTION AND WEB SECURITY Learn More CONFIGURATION MANAGEMENT Learn More URL / CONTENT FILTERING AND GATEWAY Learn More DATA CLASSIFICATION Learn More WE INTRODUCE YOUR CORPORATE ASSETS TO OPERATIONAL EXCELLENCE WITH OUR WIDE RANGE OF CYBER SECURITY SOLUTIONS, WE ANALYZE POTENTIAL RISKS EARLY AND CREATE COMPLETE LAYERS OF PROTECTION FOR THE CONTINUITY OF THE WORKFLOW. * Information Security * Network Security * Content Security INFORMATION SECURITY SECURITY INFORMATION EVENT MANAGEMENT AND CORRELATION SYSTEM Learn More SECURITY AUTOMATION Learn More SECURITY CONFIGURATION AND COMPATIBILITY Learn More USER BEHAVIOR AND ANALYSIS Learn More CORPORATE SECURITY OPERATION AND INSTRUMENTATION Learn More CYBER RISK SCORING Learn More DATA ENCRYPTION AND DEVICE ENCRYPTION Learn More APPLICATION SECURITY Learn More THREAT HUNT WITH ARTIFICIAL INTELLIGENCE Learn More NETWORK SECURITY NETWORK SECURITY MANAGEMENT Learn More ANTI RANSOMWARE SOLUTIONS Learn More CLOUD SECURITY MANAGEMENT Learn More DNS AND DHCP SECURITY AND ADRESS MANAGEMENT Learn More SECURITY GAP MANAGEMENT Learn More FIREWALL - IPS / IDS Learn More MALWARE ANALYSIS AND DETECTION Learn More ENDPOINT SECURITY MANAGEMENT Learn More CONTENT SECURITY CLOUD ACCESS SECURITY BROKER Learn More DLP (DATA LEAK PREVENTION) Learn More E-MAIL ENCRYPTION AND WEB SECURITY Learn More CONFIGURATION MANAGEMENT Learn More URL / CONTENT FILTERING AND GATEWAY Learn More DATA CLASSIFICATION Learn More JOIN OUR EVENT 16 JANUARY 2020 RADISSON BLU BOSPHORUS 2020 SECURITY AGENDA WITH CHECK POINT Join Event FOLLOW INFOSEC INFOSEC ACADEMY We train future experts with our cyber security literature covering a wide range of fields. Join InfoSEC Academy ANNOUNCEMENTS We follow the informatics world up to date and inform our users against the latest risks. Follow Latest Announcements BLOG We describe cyber security with blog posts that you can increase your personal equipment. Read Blog Posts FOLLOW INFOSEC INFOSEC ACADEMY GWe train future experts with our cyber security literature covering a wide range of fields. Join InfoSEC Academy ANNOUNCEMENTS We follow the informatics world up to date and inform our users against the latest risks. Follow Latest Announcements BLOG We describe cyber security with blog posts that you can increase your personal equipment. Read Blog Posts * Our Story * Career * Support Plans * Contact * * * * Information Security Solutions * Network Security Solutions * Content Security Solutions * AlgoSec * Boldon James * Check Point * Cisco Sourcefire * Forcepoint * Infoblox * Micro Focus ArcSight * ObserveIT * Palo Alto * Proofpoint * Pulse Secure * Rapid7 * Recorded Future * Tripwire * Vectra * VMRay DUBAI Dubai Silicon Oasis, P.O.BOX: 6009, U.A.E. ISTANBUL Merdivenköy Mah. Nur Sok. No:1/A BUSINESS İSTANBUL A Blok Kat:13 Daire:127 PK:34732 Kadıköy / ISTANBUL ANKARA İncek Mah. Turgut Özal Bulvarı 69/7 Gölbaşı / ANKARA