Video-Demo-Tour

Ask us


I agree to the terms of the Privacy policy
I agree with the provisions on data protection. I agree that Protelion will process the personal data provided by me electronically for the processing of my request and contact me, according to my explicit request, for the processing of my request. I can revoke my consent at any time with effect for the future.

Your request was sent successfully.
We’ll answer you as soon as possible.

OK

Home

/
Blog

Blog

Blog
Reactive Security
14.02.2023
SIEM (Security Information and Event Management) is an effective reactive security solution that offers a bird’s eye view of your network infrastructure.
Blog
Threat Intelligence
06.09.2022
Cyber threat intelligence can be defined as knowledge (intelligence) obtained by analyzing evidence (context, indicators, implications, advice, etc.) and related to hazards (threats) compromising data or information.
Blog
Gateway
05.09.2022
A gateway is a device in a telecommunications network used to connect to another network. In other words, it links two networks that use different protocols and architectures. The main function of a gateway is to translate traffic from one protocol to another, generally by using Network Address Translation (NAT). This allows for IP masquerading when one connection and one public IP address is shared between several devices connecting to the Internet from a LAN.
Blog
Endpoint Protection
04.09.2022
An endpoint device, also known as a terminal or end user device, is any remote computer connected to a network. Some of the most common examples are PCs, laptops, tablets, smartphones and TVs, application and database servers, switches and routers, etc.
Blog
Cloud Computing
03.09.2022
Cloud computing is a new paradigm where services and resources are provided to users over the Internet.
Blog
SCADA Systems
02.09.2022
An important portion of business of many companies and organizations worldwide is based on production processes controlled and monitored by special applications generally known as Industrial Control Systems (ICS), one of the most widely used types of which is SCADA (Supervisory Control and Data Acquisition).
Blog
Hardware Security Module (HSM)
01.09.2022
Apart from more popular solutions, such as IDS, IPS, firewall, and VPN, there is a less well-known, but extremely important component for secure data processing called a Hardware Security Module (HSM).
Blog
Security Information and Event Management (SIEM)
30.08.2022
Security Information and Event Management or SIEM is a type of software that provides organizations with useful information about potential security threats to their critical networks by means of data standardization and threat prioritization.
Blog
What is a Sniffer?
29.08.2022
A sniffer is a special application (computer program) that captures and analyzes input and/or output packets passing over a specific communications network between devices.
More blogs