IT security

Does your company focus on IT security?

In the past few years, security threats have changed and have become more advanced. Often, they are hidden from the users who are affected by malware and RATs and IT security breaches are not discovered by the usual security measures such as firewalls and anti-virus.

Have you experienced:

  • Data leaks of private and business critical data (GDPR)?
  • Breach of compliance requirements followed by legal complications?
  • Productivity losses that might be threatening to the survival of the company?
  • Ransomware - your data are encrypted and you have to ”buy” the encryption key?
  • Malicious vandalism in the form of deletion or modification of data?

Draware is specialized in IT security issues and we can help you in the processes of supplying advice, purchasing and implementing software solutions for Log Management, Ransomware, Cryptolocker, SIEM, vulnerability scanning, Patch Management, zero-day-attacks, modern malware, Advanced Persistence Threats and more.

We have more than 20 years of experience in the industry and we help private companies as well as public institutions improve their IT security situation in order to minimize the risk of an attack.

Draware’ approach is based on a number of well-known standards, including the ISO27001/2, SANS 20 CSC, NIST and the type of software and methods we recommend to our customers are typically recommended by international IT security standards.

Please contact us at +45 45 76 20 21 to hear how we can assist you in meeting the requirements of the GDPR and help improve your security posture.

IT security

Log management

  • Correlog
  • Eventtracker
  • Qradar Log Management
  • Qradar SIEM
  • AlienVault
  • ADAudit
  • EventLog Analyzer
  • Log360
  • LepideAudit Suite
  • Netwrix
Patch Management
& Application Whitelisting
  • HEAT Software
  • Avecto
  • SolarWinds
  • Desktop Central
  • Patch Connect Plus
  • Thru

Endpoint security

  • SentinelOne Ransomware & malware protection
  • Avecto

Vulnerability Scanning

  • Tenable, Nessus
  • Rapid 7, Nexpose
Security Operations Center (outsourced IT security)
  • eSentire

DDI handling

  • Efficient IP