Video-Demo-Tour

Ask us


I agree to the terms of the Privacy policy
I agree with the provisions on data protection. I agree that Protelion will process the personal data provided by me electronically for the processing of my request and contact me, according to my explicit request, for the processing of my request. I can revoke my consent at any time with effect for the future.

Your request was sent successfully.
We’ll answer you as soon as possible.

OK

Home

/
Blog

Blog

Blog
S/MIME
10.03.2024
Email offers convenience and efficiency that has made this digital communication method indispensable in everyday life.
Blog
Indicators of Compromise
13.11.2023
With communication infrastructures, one of the main concerns is preventing threats and any suspicious activity that could compromise the security of computer networks.
Blog
IoT: Internet of Things
18.09.2023
 The term Internet of Things (IoT) refers to environments where objects, sensors, and everyday items that are not generally considered computers are embedded with network connectivity and computing capability, allowing them to generate, exchange, and consume data with minimal human intervention.
Blog
IAM: Identity and Access Management
21.07.2023
For a company, maintaining the necessary flow of, and managing access to, its business data calls for full attention not only from its tech department, but from the top management as well.
Blog
Failover
17.05.2023
Failover is a backup mode of operation where the functions of a primary system component, such as a processor, server, network, or database, are switched to a secondary system component when the primary one becomes unavailable, whether due to a failure or for scheduled maintenance.
Blog
DLP: Data Loss Prevention
24.04.2023
Companies tend to be very careful about keeping their confidential information, since their business continuity and their very existence often depend on it. To protect this valuable resource, they usually apply multiple tools to try and prevent outsiders or unauthorized people from accessing it.
Blog
Active Defense
26.03.2023

Threat intelligence can help companies move from a reactive to a proactive approach to security. With real-time context and insight into the threat landscape, you can get ahead of attackers and disrupt their agenda, thus limiting the impact and cost of attacks.

Blog
Reactive Security
14.02.2023
SIEM (Security Information and Event Management) is an effective reactive security solution that offers a bird’s eye view of your network infrastructure.
Blog
Threat Intelligence
06.09.2022
Cyber threat intelligence can be defined as knowledge (intelligence) obtained by analyzing evidence (context, indicators, implications, advice, etc.) and related to hazards (threats) compromising data or information.
More blogs