Security

Security

In each software and infrastructure solutions, the support or the counseling, the security is always our priority. For the last 12 years, Choobs Ltd. has made the information security one of its main concerns. Our clients work in various fields such as finance, legal, aviation. All of these fields require a high level of information security. Our skills and our know-how, ensure the confidentiality of their data.

The strategy

Having doubts about the security of your data?

Lets' build the right strategy together!

Our experts will elaborate a custom strategy perfectly adapted to the specific needs of your company, considering the sensitivity of your data, the environment and your specific requirements. The process and the information are ranked to identify your needs in security and to control the costs.

How we do it?

  • In collaboration with your IT Manager (if any) or your management we plan the actions to be made to grant the consistency of the security strategy. A global vision of the security allows you to avoid and to correct the security flaws
  • We raise users awareness to the risks and the behavior to avoid
  • We analyze the system notifications to identify the critical issues and to limit the damages
  • We protect you against physical (fire, theft) and virtual risks and install efficient backup solutions
  • We maintain your infrastructure to correlate with your evolving needs, the new technologies and the new threats
Security audit

You have security equipment (firewalls, Antivirus…) but are you sure they are correctly set up?

You have a brand new website but are you sure there is no backdoor that would allow pirates to steal your data?

Different types of checks are possible:

  • Check of the Website/web application/application
  • Check of a public IP address
  • Check of your network

We define together the limits of the audit and the way it will be done:

  • The black box: You provide NO information on the object of the audit and we simulate an external attack
  • The grey box: You provide the basic documentation or the access to the application that has to be audited. We simulate an attack by someone who has stolen this information by identity fraud (Social engineering) or phishing
  • The white box: you provide the information (code, architecture, access…) and we provide a precise report of the security weakness found
The Implementation

Willing to set up a solution to secure your infrastructure?

We implement custom solutions for your company:

  • Firewall:
    • VPN
    • Encryptions
    • Multilayer solution
    • Intrusion Prevention System (IPS)
  • Anti- spam
  • Network identity based management
  • Internet content filtering
  • Antivirus

Fortinet is our favored partner for firewall and integrated solutions. We are also working with Cisco, Zyxel, Watchguard and Juniper. As regard to the internet security and antivirus we are working with Kaspersky as well as Symantec, McAfee and Fortinet.

The maintenance

Technology evolves rapidly. Stay up to date and keep your security level!

We maintain your security solutions by:

  • Updating your security system on a regular base
  • Adjustment of your security tools to the evolution of your company
Problem solving

You are under attack or you think you have been the victim of a security flaw?

We can help you by stopping quickly the leak of your data:

  • Investigations following an incident (forensics analysis)
  • Incident response
  • Disinfection (antivirus)
  • Data recovery