OUR SERVICES

I-TRACING offers IT security engineering services with high technical value and spirit of commitment.

Our offer is based on the fundamental need of any company to know, identify, track, protect, handle and enhance access to its sensitive data and those of its customers (know-how, personal, legal, commercial data, etc.).

This need is also made unavoidable by current legal compliances (CNIL, ANSSI, PCI-DSS, SOX, ARJEL, ISO 2700x, etc.).

OUR COMMITMENT

DESIGN USER-ADAPTED CYBER SECURITY SOLUTIONS, IN A TURN-KEY PROJECT APPROACH

OUR RANGE OF SERVICES

Cyberdefense

Audit & Offensive Security

CyberSOC – Security Operations Center

CERT – Computer Emergency Response Team

VMC – Vulnerability Management Center

Consulting & Engineering

CISO Part-Time

Governance, Risk and SSI Compliance

Cloud Security

Data Protection

Security Architecture & Expertise

Security Development

Training & Awareness

Identity & Access Management

Support & Managed Services

Support & Administration Assistance

Maintenance in Operational Conditions

Administration

Operation

Hosting

Consulting & Evolutions

OUR AREAS OF EXPERTISE

Advanced Threats (DDoS, APT, …)

  • Vulnerability Management : technology watch, detection, remediation

  • Anti APT solutions : workstation protection, servers, mobile devices, messaging services, web navigation

  • Anti DDoS solutions

Authorizations and Identity Management – Idento by I-TRACING

  • Authorizations and access governance

  • Identity Access Management

  • Access Control, Adaptative Authentication

  • Identity Federation

Data protection

  • Definition and integration of sensitives data protection policies

  • Integration of security measures: access control, encryption and risks reduction (anonymous data, token)

  • Detection and remediation of policy violations

  • Detection and remediation of data leak

Applications protection (cloud natives, on premises)

  • Microsegmentation, sealing

  • Virtual patching

  • Applicative firewalls, middlewares

  • Continuous integration / securization of development chains

  • Containers control and surveillance

Protection models adaptation and detection of cloud or hybrid architectures

  • Definition, control and remediation of cloud policies

  • Detection of policies violations (CASB, CSPM)

  • Protection / surveillance of workloads and containers

Compliance Upgrade

  • Legal compliance: LPM, GDPR, CNIL, ANSSI, PCI-DSS, DSP-2, SOX, HIPAA, ARJEL, ISO 2700x, RGS, HDS (Health Data Hosting)

  • Standards definition and integration of policies control

  • ISSP definition and security policy monitoring

  • Firewalls configuration conformity check

These transversal areas of expertise enhance the MSSP policies and incident response methods

OUR FOLLOW-THE-SUN COVERAGE

FOLLOW-THE-SUN

I-TRACING supports you throughout the life cycle of your IT security projects internationally.

Strengthened by its expertise and its international presence, I-TRACING has created the “Follow-The-Sun” SOC offer which allows the development of a continuous CyberSOC activity.
Operating on a 24/7 basis, the activity is provided by the 3 subsidiaries of I-TRACING GROUP located in Paris, Hong-Kong and Montreal.

Pin It on Pinterest

Shares
Share This
M