Stay safe!

Cyber-crime threats are among the greatest threats to businesses today. Compromised security measures and data theft can have devastating consequences. The security and productivity of companies is therefore increasingly dependent on their system infrastructure and measures implemented to protect it.

With a comprehensive and integrated range of security services and products, S&T provides state-of-the-art security for its customers. 


S&T IT Security Services

S&T has extensive experience in designing, implementing and maintaining IT network & security solutions - gained in a number of successfully implemented projects.  

Consulting: Successful security projects need to be based on sound analysis and a thorough understanding of the customer's requirements. At the beginning of such a project there is always a precise analysis - assessment - of the existing IT landscape and customer requirements plus threat scenarios. S&T can help you create security strategy and select solutions that suit you best

Integration: In the next step S&T implements projects in the chosen security environment. During the implementation process S&T follows the recommended methodologies in order to minimise implementation time and project risks.  

Outsourcing: S&T ensures that security components are configured and maintained within the framework of customised support models. This allows customers to concentrate fully on their core business.

S&T also offers complete maintenance with 24x7 support, as well as training of end users.

IT Security Environment Services (excerpt)

Next Generation Firewalls                   

NG firewalls form the basis of the S&T security platform. Firewall services are provided at the network perimeter and within the network at logical trust boundaries. That includes Intrusion Prevention System, Application Control and URL filtering

All data traffic is subjected to a single-pass check, checking the entire context of the application, the associated content and the user identity. To ensure the highest level of protection possible, additional behaviour-based systems such as sandboxing are also used.

Professional log & event management (SIEM)

The logging service collates data from all logging services and makes it available as a central repository. This enables alerts to be given automatically in the event of security incidents and offers extended functionalities by comparing all relevant log information. 
Logs can be sorted into streams according to different search terms. Security relevant logs can be filtered and forwarded to the Security Information and Event Management (SIEM) tool.

Security Orchestration,                Automation & Response (SOAR)

This technology enables organizations to take inputs from a variety of sources - mostly from security information and event management (SIEM) systems and apply workflows aligned to processes and procedures. These can be orchestrated via integrations with other technologies and automated to achieve the desired outcome and greater visibility. Additional capabilities include case and incident management features; the ability to manage threat intelligence, dashboards and reporting; and analytics that can be applied across various functions.

Web Application Firewall (WAF)                                      

Web application attacks prevent important transactions and steal sensitive data. A web application firewall (WAF) is a specific form of application firewall that filters, monitors, and blocks HTTP traffic to and from a web service. It analyzes traffic to your applications to stop these attacks to ensure uninterrupted business operations.

Privileged Access Management (PAM)

Privileged access management - PAM solution gives your organization a secure way to store, manage, record and analyze privileged access. Additionally to our PAM, you can mitigate risk, secure data, meet uptime requirements and satisfy compliance by giving your users access to data and applications they need - and nothing more. Now, identity and access management can be driven by business needs, not IT capabilities. 

Powerful email security solutions 

Using modern next-generation mail security solutions, the security of mail services can be guaranteed regardless of their location -  in a customer data center or in the cloud. 

In addition to classic mail security, services such as sandboxing or data loss prevention solutions can also be provided.

Reliable endpoint protection          

S&T endpoint protection solutions feature first-class security with advanced detection capabilities such as behavioural analysis, machine learning and vulnerability protection, used in conjunction with other endpoint and server detection and recovery functions.

Data Protection and Database Audit

Data security solution that S&T offers protects your data wherever it lives: on-premises, in the cloud, and in hybrid environments. It also provides security and IT teams with full visibility into how the data is being accessed, used, and moved around the organization.

Database access control is necessary for high-confidential systems.  IT monitors relational databases, data warehouses, big data, and mainframes to generate real-time alerts on policy violations.

Selected Network and Security Partners