Video-Demo-Tour

Ask us


I agree to the terms of the Privacy policy
I agree with the provisions on data protection. I agree that Protelion will process the personal data provided by me electronically for the processing of my request and contact me, according to my explicit request, for the processing of my request. I can revoke my consent at any time with effect for the future.

Your request was sent successfully.
We’ll answer you as soon as possible.

OK

Home

/
Blog

Blog

Blog
Failover
17.05.2023
Failover is a backup mode of operation where the functions of a primary system component, such as a processor, server, network, or database, are switched to a secondary system component when the primary one becomes unavailable, whether due to a failure or for scheduled maintenance.
Blog
DLP: Data Loss Prevention
24.04.2023
Companies tend to be very careful about keeping their confidential information, since their business continuity and their very existence often depend on it. To protect this valuable resource, they usually apply multiple tools to try and prevent outsiders or unauthorized people from accessing it.
Blog
Active Defense
26.03.2023

Threat intelligence can help companies move from a reactive to a proactive approach to security. With real-time context and insight into the threat landscape, you can get ahead of attackers and disrupt their agenda, thus limiting the impact and cost of attacks.

Blog
Reactive Security
14.02.2023
SIEM (Security Information and Event Management) is an effective reactive security solution that offers a bird’s eye view of your network infrastructure.
Blog
Threat Intelligence
06.09.2022
Cyber threat intelligence can be defined as knowledge (intelligence) obtained by analyzing evidence (context, indicators, implications, advice, etc.) and related to hazards (threats) compromising data or information.
Blog
Gateway
05.09.2022
A gateway is a device in a telecommunications network used to connect to another network. In other words, it links two networks that use different protocols and architectures. The main function of a gateway is to translate traffic from one protocol to another, generally by using Network Address Translation (NAT). This allows for IP masquerading when one connection and one public IP address is shared between several devices connecting to the Internet from a LAN.
Blog
Endpoint Protection
04.09.2022
An endpoint device, also known as a terminal or end user device, is any remote computer connected to a network. Some of the most common examples are PCs, laptops, tablets, smartphones and TVs, application and database servers, switches and routers, etc.
Blog
Cloud Computing
03.09.2022
Cloud computing is a new paradigm where services and resources are provided to users over the Internet.
Blog
SCADA Systems
02.09.2022
An important portion of business of many companies and organizations worldwide is based on production processes controlled and monitored by special applications generally known as Industrial Control Systems (ICS), one of the most widely used types of which is SCADA (Supervisory Control and Data Acquisition).
More blogs