Follow us:
Twitter
Facebook
Youtube
LinkedIn
Slideshare
Our Location
Contact us: phone +371 29 162 784 | e-mail: info@dss.lv

Services

Security Intelligence (SIEM)

QRadar SIEM delivers the industry’s only SIEM system solution that gives security professionals the visibility they need to protect their networks. QRadar’s advanced SIEM technology protects IT assets from a growing landscape of advanced threats as well as meets current and emerging compliance mandates.

GDPR Data Discovery

As a best friend to any DPO – DSS scans the whole hard drive, fileshares, databases, semi-structured data storages, email servers, backups and finds and auto-classifies files even in the Recycle Bin, ensuring that what is expected to be deleted was actually deleted. Accurately monitor, protect and report violations any time a file is saved and/or blocked from saving; essentially eliminating the necessity to endlessly scan machines for data violations. Discovers and understands sensitive data and relationships before sensitive data is moved to big data environments. And reports detailed information for each violating file, including location, actual content, context, file owner, file name, last accessed/modified time, policy violation and more. It includes a complete workflow functionality which allows to simultaneously respond to multiple violations.

Data Security

One of today’s most rapidly evolving and widely deployed technologies is server desktop virtualization. Many organizations are already realizing the cost savings from implementing virtualized servers, and systems administrators love the ease of deployment and management for virtualized system. In addition, many organizations are evolving virtualized infrastructure into private clouds.

Identity Security

Today, every organization is faced with the complex challenge of efficiently validating user identity and enabling secure access. Identity thefts results in employees taking an average of 175 hours of work time to restore their identity following identity theft.

Cyber Risk Management

Today, every organization is faced with the complex challenge of efficiently validating user identity and enabling secure access. Identity thefts results in employees taking an average of 175 hours of work time to restore their identity following identity theft.

Network & Industrial Security

Technology in the network security space has been through many dramatic changes recently. New mobile operating systems, growing use of personal devices, and SaaS delivery make securing the network a growing challenge. Traditional defenses such as Firewall, IPS, NAC alone are fragmented and don’t give full information and protection.

Mobile Security

Mobile devices are the primary personal communications and computing platform for business. However, they introduce cost, risk, and usability challenges that traditional mobile device management strategies cannot address.

Endpoint Security

Many international studies show that endpoints cause over 75% of all IT Security incidents. Configuration errors, vulnerability, stolen or lost computers or data, lack of access control and monitoring etc., together with disloyal employees or cybercriminals make troubles to business.