Mechsoft technologies is a leading IT solution provider based in Dubai specializing in ERP implementation, Backup solutions and Cybersecurity solutions.
1. IT Security solution provider
Our IT Security Products & Services
www.mechsoftme.com
The bug stops here for Security!
2. Ekran Systems– EmployeeMonitoring
✓ Affordable user monitoring solution for enhanced cyber security. Comes with perpetual license
✓ Record all terminal, remote, and local user sessions and alert security personnel to any suspicious events.
✓ Record sessions based on : Name of launched application, The title of the active window, Entered URL,
Text entered via user’s keyboard
✓ Searchable videos that takes minimal space to record
User Activity Monitoring
Sessions (video) Recording
Server Monitoring
USB monitoring/blocking
Privileged User Monitoring
3. Indefend– DataLeakageprevention
✓ Proactively analyzes and facilitates the employers to detect and analyze
various sensitive activities performed by employees by monitoring
Browser activities, Application Usage, USB devices and time based reports.
✓ Protect organization’s confidential data against all Insider Threats and Data
Leak.
✓ Track illegitimate activities of people working under third party contract.
Insider Threat Response System
Endpoint Data Leakage Prevention
Intellectual Property Theft protection
Web Content Filtering
Employee Behavior Monitoring
Workplace Productivity Monitoring
Application Monitoring/Whitelisting
4. NeuShield–RansomwareProtection
➢ Complete Data Protection Against All Types
of Ransomware Attacks
File and Data Protection
Recovers data files with a single click
Disk and Boot Protection
One-Click Restore to simply revert changes
With virtually no impact on computer’s overall
performance
Prevents ransomware and malicious programs
from taking over the boot process
Stops wiper malware from erasing all data on
the hard drive
5. FileAudit– monitorshared
folders/filesonFILEservers&Cloud
➢ Windows File Server Auditing
Track, audit, report, alert & respond on all access to
files and folders on Windows Servers.
Monitor & record file read/write/delete accesses (or
access attempts), ownership changes, and
permission modifications in real time.
Significantly reduce the workload related to
monitoring access to sensitive files and folders.
File Auditing to data stored in the cloud - OneDrive,
Google Drive, Dropbox & Box
6. Bluvault–SECUREENDPOINT
DATABACKUPforo365customers
➢ Full encrypted backup of Workstations
100% defense against
Ransomware attacks
Support for
Windows, Mac and
Linux endpoints.
70% cost savings on
storage costs
Accomplish quick
Data Restores
Auditable Data Trail
Allows initial full
backup and
subsequent
incremental or log
backups.
Can utilize Microsoft
OneDrive for
Business as backup
destination for O365
users.
Snapshot based
backups ensure that
files in use can also
be backed up.
7. BackupAssist–Affordable
ServerBackup
➢ Server Backup with Ransomware protection
Perpetual license
Active Ransomware Defense
Physical & Virtual - Onsite & Cloud Backup
Incremental Backups
Rapid Restore & Recovery
Local, NAS, iSCSI, External Disk, RDX, Tape & Cloud.
Used by NASA, Volvo, Cessna, MIT, Stanford, and others.
Hyper-V Advanced Add-on, Exchange Granular Add-on, SQL
Continuous Add-on, Tape Archiving Add-on, Multisite
Manager & Backup Assist for desktops.
Use the wizard-based job creator to protect your server,
files, and applications
8. MiniOrange –
MultiFactorAuthentication
&SingleSignOn
✓ Authentication options include
One time passcodes (OTP) over
SMS, OTP over Email, OTP over
SMS and Email, Out of Band SMS,
Out of Band Email, Soft Token,
Push Notification, USB based
Hardware token, Security
Questions, Mobile Authentication,
Voice Authentication (Biometrics),
Phone Verification, Device
Identification, Location, Time of
Access, User Behavior.
✓ SSO (Single Sign On) provides
easy and seamless access to all
enterprise resources with one set
of credentials.
✓ Easy to deploy and manage.
Comes with competitive pricing.
➢2 Factor Authentication
➢ Single Sign-On
➢ Identity & Access Management
➢ 15+ Authentication methods
9. UserLock–logonsecurityforactive
Directoryusers
➢ User Access Security for Active Directory users
UserLock secures access to Windows networks by:
•Monitoring user logins,
•Restricting simultaneous sessions,
•Limiting user access to the network
•By session type (desktop, wifi, VPN, RDP or web sessions)
•By Workstation
•By time
•By time quota
•Providing administrators with remote session control, alert options and advanced
reporting for session analysis.
•Detecting and responding to security threats (block a user)
Enforce compliance with major regulations (PCI, GDPR, HIPAA, ISO 27001,
SOX, NISPOM…)
Connectivity surveillance and monitoring
10. uSecure- SecurityAwareness
Platformforendusers
✓ uLearn - Security Awareness sessions for your
employees
✓ uPhish - Simulated phishing tool
✓ Email Breach Detection - Identify which
employee emails and passwords are exposed
✓ GAP Analysis - Security gap analysis service
based on ISO 27001
➢7 Steps to Being Secure at Home
➢ Cloud Security
➢ Mobile Device Security
➢ Online Safety - Internet and
Email use
➢Phishing
➢ Physical Security
➢ Public Wi-Fi
➢ Removable
Media
➢Secure Passwords and
Authentication
➢ Social Engineering
➢ Using Social Media Safely
➢ Working Remotely
➢The Data Protection Act
➢ PCI DSS
➢ Data Classification
➢ GDPR
11. Undelete – FileRecoveryfor
windowsservers&users
➢ The world leader in instant file recovery with
up-to-the-minute protection
✓ Enables easy recovery of deleted and overwritten local and
network files
✓ Secure Delete Electronic File Shredder - files that are purged
from the recovery bin are overwritten with random data. Ability
to securely delete files immediately.
✓ Wipe Free Space overwrites a volume's free space providing a
complete solution of erasing secure data.
✓ Provides continuous data protection for Windows PCs and
servers
✓ Recovers previous or overwritten versions of Word, Excel,
PowerPoint CAD, Photoshop and other files
✓ Protection from potential security risks when Recovery Bin is
stored in the cloud
✓ Instantly recovers files in virtual environments
✓ Central management through Undelete Server
12. Dmarcian – email
spoofingprotection
➢ Secure your domains from email
impersonation and phishing attacks
Get strong controls to secure your domains and
protect end users from fraudulent abuse such as
phishing and malware
Disallow unauthorized use of your email domain
to protect people from spam, fraud, and phishing
Gain visibility into who and what across the
Internet is sending email using your email domain
DMARC/SPF/DKIM checker
Enrichment of the DMARC data with sources
Processing of DMARC Reports (RUA)
Automatic Subdomain Detection
13. WatchTowerS.M.a.r.t365– SoCinaBox
➢ Cost effective Managed Security Services offering with 24X7 monitoring & Incident Response. SoC in a Box
provides customers with SIEM, Network Intrusion Detection, Data Leakage Prevention, Incident Response &
Forensics without having to invest into any of these tools. Starts at AED 5,000 per month
➢ We help you stay secure!!
SMART 365 Features
SIEM
Network Intrusion Detection
Data Leakage Prevention
Incident Response
Forensics
Secure :- Constant & comprehensive cybersecurity
Monitor :- Efficient & reliable threat monitoring &
detection
Alert :- Prompt and precise Threat reports
Respond :- Timely Response to incidents
Troubleshoot :- Triage, investigate & report
14. Our IT Security Services
We offer below IT Security services.
VA/PT (Penetration
Testing)
Network
Compromise
Assessment
Email Spoofing
Analysis &
Protection
Digital Forensics
(Incident Response)
Online Reputation
Management
SOC as a Service
(SIEM, Vulnerability
Assessment,
Intrusion Detection)
Certification/Compli
ance – ISO 2700X,
NESA, ADSIC, PCI
DSS, GDPR
Security Awareness
Training
Cyber Threat
Hunting