Network Computing

Network Computing

Doing business in today’s connected environment, business networks will constantly be under threat. Unauthorized users and online attacks can wipe out internal data and even completely take down the organization’s network. The right protection is needed for the technology that any organization relies on. MTC has the experience to keep your organization’s data and network secure. Micro Technology Company (MTC) provides rich, connected capabilities across the IT infrastructure while protecting confidential client data from disruption and intrusion. MTC’s expertise includes the provision of industry-leading security and reliability products that protect client data and keeps the IT infrastructure running smoothly.

NETWORK SECURITY
  • Network Mapping
  • Packet Capture
  • Firewalls
  • DMZs
  • Network based IDSs and IPS
  • VPNs
  • Network Encryption
  • Routers / Switches
  • Gateways
  • Netflow and Software Defined Networking (SDN)
  • Secure VoIP
  • IP Camera and Facial Recognition program
  • Automated IoC Detection
  • Lateral Movement Detection
  • SMB/SMB2 Detonation
  • Metadata Protocols
  • Bro/Snort Signatures
  • Multi-vector Correlation
  • STIX/TAXII
  • Signatureless Threat Detection
  • DDoS, IPV4/6
  • Network Access Control (NAC) discovery of 802.x and non 802.x devices
SERVER & HOST

Doing business in today’s connected environment, business networks will constantly be under threat. Unauthorized users and online attacks can wipe out internal data and even completely take down the organization’s network. The right protection is needed for the technology that any organization relies on. MTC has the experience to keep your organization’s data and network secure. Micro Technology Company (MTC) provides rich, connected capabilities across the IT infrastructure while protecting confidential client data from disruption and intrusion. MTC’s expertise includes the provision of industry-leading security and reliability products that protect client data and keeps the IT infrastructure running smoothly.

  • OS hardening
  • Integrity protection
  • Virus Scanning
  • Patch management
  • Host based IDSs
  • File encryption
  • OS Auditing
  • Advanced Threat Analytics for Domain Controllers
ACCESS CONTROL

Doing business in today’s connected environment, business networks will constantly be under threat. Unauthorized users and online attacks can wipe out internal data and even completely take down the organization’s network. The right protection is needed for the technology that any organization relies on. MTC has the experience to keep your organization’s data and network secure. Micro Technology Company (MTC) provides rich, connected capabilities across the IT infrastructure while protecting confidential client data from disruption and intrusion. MTC’s expertise includes the provision of industry-leading security and reliability products that protect client data and keeps the IT infrastructure running smoothly.

  • Public Key Infrastructure (PKI)
  • Identity & Access Management
  • Multi-Factor
  • Biometrics
  • PIV and HSPD-12
  • Active Directory (AD) and Active Directory Federation services (ADFS)
  • Single Sign-on
THREAT INTELLIGENCE

Cyber Threat Intelligence (CTI) is not the same as cyber security. While cyber security comprises the recruitment of IT security experts, and the deployment of technical means, to protect an organization’s critical infrastructure, or intellectual property, CTI is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. CTI’s key mission is to research and analyze trends and technical developments to protect your assets. Micro Technology Company (MTC) provides rich, connected capabilities across the IT infrastructure while protecting confidential client data from disruption and intrusion. MTC’s expertise includes the provision of industry-leading security and reliability products that protect client data and keeps the IT infrastructure running smoothly.

  • Executive Protection
  • Threat Intelligence Platform (TIP) Service
  • Real Time Signature and Event Stream Detection
  • Non-Malware Behavioral Threat Detection
  • Cyber Espionage
  • APT Detection
  • TTP Trigger
  • Cyber Crime
  • Fusion Center Operations
  • Focused and General Threat Briefing
  • Machine Learning
  • Deep and Dark Web Monitoring
  • Threat Hunting
  • Brand Reputation Monitoring
  • Indicator Enrichment
  • Threat Actor Motivations and Methods Discovery