Call us to find out how IT Security can help you.

Solutions

  Security Service  Network Security  Physical/Logicall Access  Data Leakage Prevention  Other solutions

Contact us at:

  • Phone: +852 28510271
  • Fax    : +852 28510155
  • Email  : info@udshk.com


  • Our address:

    UDS Data Systems Limited
    Room 2101-2102,
    Technology Plaza,
    651 Kings' Road, Hong Kong

    Security Service

    Security Assessment is generally referring to a Vulnerability Assessment which scans an organization’s infrastructure and identifies vulnerabilities (faulty firewall, lack of system updates, malware, etc.). With the assessment results, the technician can recommend steps to remedy the problems within the system.
     
    A penetration test, or sometimes pentest, is a software attack on a computer system that looks for security weaknesses, potentially gaining access to the computer's features and data
     
    Vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses.
     
    Policies should be reviewed at planned intervals to ensure their continuing suitability, adequacy, and effectiveness.
     
    Source code scanning is to analyze source code and/or compiled version of code in order to help find security flaws. Ideally, such tools would automatically find security flaws with such a high degree of confidence that what's found is indeed a flaw.
     
    Security Awareness Training will educate employees about corporate policies and procedures for working with information technology (IT).  Employees should receive information about who to contact if they discover a security threat and be taught that data as a valuable corporate asset.


    Network Security

    To fight against day to day evolving potential threat, we provide multi layer network protection solution to help you to prevent unauthorized access to your corporate network. These solution combine the technologies include firewall, antivirus, instruction prevention system and safeguard your network access gateway.

    For authorized remote access, we provide SSL VPN with two factor authentication solution. Such solution enables a secure and ease-to-use communication channel for your business partner to connect from remote network, home or even hotel.

    Physical and Logical Access

    Physical security restricts access to company premises and logical security protects IT resources. These two areas usually work independently. Now organizations need to mitigate information theft risk and comply with data protection regulations. We provide an integrated approach to combine power of both physical security control and logically security control with one single employee card. Employee with on single card (with contact or contactless technology) can securely identify himself and access authorize physical and logical resources.

    Data Leakage Prevention

    Data leakage may occur when data itself is being transferred, processed or even at rest. The increasing use of mobile devices and removable media make the chance of data leak increases substantially. To cope with the problem, we provide Data Leakage Prevention (DLP) solutions which include encryption, access control, device control and content filtering to help you to protect the data at rest, data in motion and data in processing.

    Other Solutions

    The above solutions are only a shortlist. We understand that your security requirements could be unique, and we are committed to design a solution to fulfill your requirements.