|The intrusion detection probe brings added value to a security system. In particular, it complements the filtering function of firewalls. Intrusion detection probes read and analyze all packets coming from the Internet. They can recognize the signatures of attacks and intrusion attempts, and reject any suspicious packet.||Using their knowledge of these technologies, our technical teams study the needs of your infrastructure and advise you on solutions based on your requirements and your budget.|
|With Qualys it is possible to audit each network entity and each system in order to detect potential vulnerabilities. A detection engine updated daily references a vulnerability knowledge base.
||With its reliable, transparent audits using a high speed scan (lasting 3 to 6 minutes), the detection engine is non-intrusive and has zero impact on the availability of the network and systems entities it examines. Qualys is considered the most efficient and relevant Vulnerability Assessment Service. We recommend it for all levels of service.|
|To increase the level of security of the data exchanges with our Clients’ architectures, we use VPNs (Virtual Private Network) to access them, which enables secure transmission via an encrypted tunnel through the Internet.||Moreover, our security policy blocks any access to staff computers if a password and login ID are not entered. Our administrators’ sessions automatically lock after 5 minutes of inactivity. The password must also be changed every 45 days.