TECHNOLOGIES
Gimmal has been helping organizations take control of one of their most valuable assets – information – for more than 20 years. The company provides software and methods to enable efficient discovery, migration, management and compliance of data, helping to reduce the risk of regulatory breaches and increase business efficiency. Gimmal’s solutions are designed to work with existing IT infrastructure and have minimal impact on daily processes. With experience gained since 2002 and technology partnerships with companies such as Microsoft and SAP, Gimmal acts as a trusted advisor to help select the best information management strategy. The company’s goal is to build future-ready systems – enabling the use of current resources, as well as migrating from outdated platforms to modern and flexible solutions.


Prevent malicious file transfers for web applications that bypass sandboxes and single malware detection solutions.
Deep Content Disarm and Reconstruction (Deep CDR): Disarm more than 90 popular file types and reconstruct each file, providing full usability with secure content.
Scan with more than 20 malware protection engines using signatures, heuristics and machine learning technologies to detect known and unknown threats as early and efficiently as possible.
Checkmk is a comprehensive application, server and network monitoring solution, created in collaboration with users and developed over the years to meet the needs of both administrators and DevOps teams. It combines ease of use with enough performance for the most complex IT environments, enabling full monitoring of hybrid infrastructure and faster troubleshooting to avoid unplanned downtime or failures. The software is available in several variants: Checkmk Enterprise, Checkmk Enterprise for Groups and Managed Services, Checkmk Cloud (self-hosted) and Checkmk MSP. Each can be complemented with technical support (Pro or Advanced), as well as extensions such as synthetic monitoring (minimum 10 tests per year, expandable), virt1 (virtual appliance) integration or ntop. As a result, Checkmk offers a flexible and scalable approach to monitoring to fit different deployment models and infrastructure sizes.


Critical networks pose a particular challenge to security practitioners because they are isolated and without access to the Internet, so they are vulnerable to attacks from mobile media and similar file transfer technologies. OPSWAT offers a secure, end-to-end process for transferring files to and from isolated networks. The solution is widely used in the manufacturing, energy, government, banking, pharmaceutical and entertainment industries.
Certes CryptoFlow solutions are the first products in the industry to combine the flexibility and power of virtualized networks with the most secure cryptographic technology. With Certes CryptoFlow solutions, enterprises and service providers can create tunnelless, multipoint and multi-layer next-generation VPNs that protect traffic for any application on any network (Next Generation VPN). CryptoFlow-VPNs protect data traffic in LAN, WAN, Internet, virtual and cloud environments. Certes CryptoFlow-VPN can be configured in seconds with an extremely simple point-and-click interface for creating security policies.


The most dangerous threats to IT infrastructure are related to attacks targeting application vulnerabilities. Conventional security measures such as firewalls and intrusion detection systems have great difficulty detecting such intrusions.
Application Security Manager (ASM) provides full protection for Web applications and XML-based services. The use of an application firewall provides customers with major benefits, including: protection against application attacks, compliance with regulations (including PCI DSS) and passing security audits without interfering with application code.