SIEM and IDM
[vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#ffffff” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”25″ bottom_padding=”25″ overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text style=”full_text”]
At 4AC we have the best security event management and identity management
systems to help you comply with regulations and laws.
[/nectar_highlighted_text][/vc_column][/vc_row][vc_row type=”full_width_content” full_screen_row_position=”middle” equal_height=”yes” content_placement=”top” bg_color=”#ffffff” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column centered_text=”true” column_padding=”padding-2-percent” column_padding_position=”all” background_color=”#f4f4f4″ background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” bottom_margin=”0″ width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text style=”full_text”]
SIEM
[/nectar_highlighted_text][fancy-ul icon_type=”font_icon” icon=”icon-ok” color=”Accent-Color” alignment=”left” enable_animation=”true” delay=”20″]
-
Centralize storage and LOGS.
-
Allows analysis in real time.
-
Get automated reports.
-
Helps detect fraud and theft of sensitive information within the entire organization.
[/fancy-ul][/vc_column][vc_column centered_text=”true” column_padding=”padding-2-percent” column_padding_position=”all” background_color=”#eaeaea” background_color_opacity=”1″ background_hover_color_opacity=”1″ font_color=”#ffffff” column_link_target=”_self” column_shadow=”none” column_border_radius=”none” bottom_margin=”0″ width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text style=”full_text”]
IDM
[/nectar_highlighted_text][fancy-ul icon_type=”font_icon” icon=”icon-cog” color=”Accent-Color” alignment=”left” enable_animation=”true” delay=”20″]
-
Centralize identities in your infrastructure.
-
Automatize registrations, cancellations and changes of users.
-
Avoid attacks by orphaned accounts or unauthorized privileges.
-
Certifies accesses and user accounts.
[/fancy-ul][/vc_column][/vc_row][vc_row type=”full_width_content” full_screen_row_position=”middle” bg_color=”#ffffff” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][divider line_type=”No Line”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”middle” bg_color=”#f7f7f7″ scene_position=”center” text_color=”dark” text_align=”left” top_padding=”2%” bottom_padding=”2%” color_overlay=”#ffffff” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][image_with_animation image_url=”3215″ alignment=”center” animation=”Fade In” border_radius=”10px” box_shadow=”small_depth” max_width=”50%”][/vc_column][vc_column column_padding=”padding-10-percent” column_padding_position=”all” background_color=”#ffffff” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none” enable_animation=”true” animation=”fade-in-from-bottom”][vc_custom_heading text=”Microfocus” font_container=”tag:h2|font_size:40|text_align:left|line_height:50px” use_theme_fonts=”yes”][vc_column_text]
- ArcSight SIEM
- Sentinel SIEM
- Identity and Access Management
- Voltage
- Fortify
[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_content” full_screen_row_position=”middle” equal_height=”yes” content_placement=”middle” bg_color=”#ffffff” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”padding-10-percent” column_padding_position=”all” background_color=”#f4f4f4″ background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none” enable_animation=”true” animation=”fade-in-from-bottom”][vc_custom_heading text=”IBM” font_container=”tag:h2|font_size:40|text_align:left|line_height:50px” use_theme_fonts=”yes”][vc_column_text]
- IBMQradar SIEM
[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][vc_column centered_text=”true” column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][image_with_animation image_url=”3222″ alignment=”center” animation=”Fade In” border_radius=”10px” box_shadow=”small_depth” max_width=”50%”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”middle” bg_color=”#f7f7f7″ scene_position=”center” text_color=”dark” text_align=”left” top_padding=”2%” bottom_padding=”2%” color_overlay=”#ffffff” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][image_with_animation image_url=”3214″ alignment=”center” animation=”Fade In” border_radius=”10px” box_shadow=”small_depth” max_width=”50%”][/vc_column][vc_column column_padding=”padding-10-percent” column_padding_position=”all” background_color=”#ffffff” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none” enable_animation=”true” animation=”fade-in-from-bottom”][vc_custom_heading text=”Splunk” font_container=”tag:h2|font_size:40|text_align:left|line_height:50px” use_theme_fonts=”yes”][vc_column_text]
- Splunk Enterprise
- Splunk Cloud
- Tunning de Splunk
[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]