AUSY at the center of Information System solutions
A few of our References
For a + flexible and + reactive infrastructure Make technical infrastructures easily available and adaptable, based on simple technical solutions with a low adhesion between material, systems and tools.
Produce and control performances in accordance with various needs.
Globalise a maximim number of projets with assessed risk and security management.
Interventions at level 2 &3 in 24/7 on the Network & Security – Telecommunications Sector
For a + flexible and + reactive infrastructure
Make technical infrastructures easily available and adaptable, based on simple technical solutions with a low adhesion between material, systems and tools.
|For Cost Control and Optimisation|
Standardise and reinforce architectures through widespread virtualisation,
|For a multi-skilled technological control|
| Open systems Unix, Linux, Microsoft and virtualisation |
Application management, databases and storage
Supervision, service quality and metrology
Networks lan, Man, Wan, TOIP/VOIP
Network security, identity management, system protection
|For a high level Security offer|
Project Management and Assistance: Audit and consultancy on IS security management for all company permieters (global companies, DSI, production, service contracts, function definitions), choice and implementation of indicators, risk management (particularly for the activity continuity plan (ACP),
Risk analysis and security policy,
Awareness, training and user certification for IS security: integration of IS security in the projects,
Audit and definition of security architectures,
Integration of technical security solutions for operating processes and the reorganisation of operating teams,
Operating of production infrastructure security measures.
EBIOS: Risk analysis method
ISO 27002: IS security management system
ISO27005 & EBIOS: Risk analysis method
ISO 13335-1 à 5: Technical reference
Expertise firewall (Checkpoint, Cisco, Netscreen, Symantec, F5 Network, Fortinet…)
Expertise IDS (ISS, Snort, Cisco, Symantec, …)
Expertise Mail Security – Antivirus – Antispam (Symantec, Clearswift, Trend,…)
Expertise Security supervision (IBM Tivoli, Nagios, Symantec, Netforensics, NS One, …)
Expertise authentification (Secure Computing, RSA, ActiveCard, Microsoft, …)
Expertise QOS (Squid, ISA, Iplanet, Bluecoat, NetApp, F5 Network, Alteon, Cisco, )
Expertise Open Source Security
Audit and deployment Security - Maritime Transportation Sector