Perimeter Security

Control the network, technology, and data. It is the outer edge of to control and have a responsibility to safeguard. As such, it is also the first point of contact for many external threats to the network.

 - IDS/IPS
 - Firewall
 - DMZs
 - Message Security (anti-virus, anti-malware)

Network Security

Protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system.

 - Enterprise Message Security
 - Web Proxy Content Filtering
 - Enclave / DataCenter Firewall
 - Enterprise IDS/IPS

Endpoint Security

Protection of computer networks that are remotely bridged to client devices. Attempts to ensure that such devices follow a definite level of compliance to standards.

 - Host IDS/IPS
 - Content Security (anti-virus, anti-malware)
 - Endpoint Security Enforcement
 - Desktop Firewall

Application Security

Encompasses measures taken to improve the security of an application by finding, fixing and preventing security vulnerabilities.

 - Dynamic App Testing
 - Static App Testing / Code Review
 - Database Monitoring / Scanning
 - Database Secure Gateway (Shield)
 - WAF

Data Security

Protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.

 - Data Integrity Monitoring
 - Data Classification
 - Identity & Access Management
 - Enterprise Right Management
 - D L P

Mission Critical Assets

Prevention (Policy Management)

 - Penetration Testing
 - Vulnerability Assessment
 - Cyber Threat Intelligence
 - Security Architecture & Design
 - Security Policies & Compliance
 - Risk Management

Monitoring and Response (Operations)

- SIEM
- SOC/NOC Monitoring (24x7)
- Security Dashboard
- Digital Forensics
- Security SLA/SLO Reporting
- Incident Reporting, Detection, Response (CIRT)
- Continuous Monitoring and Assessment Situational Awareness

i_pdf 01

PAA Company Profile

For more information about the solutions,
Please download the PDF here.

Partners_13
Partners_04
Partners_04
Partners_04
Partners_04
Partners_08
Partners_09
Partners_09
Partners_09
Partners_09
Partners_08
Partners_09
Partners_09
Partners_09
Partners_09