Strona korzysta z plików cookie w celu realizacji usług zgodnie z Polityką Cookies. Możesz samodzielnie określić warunki przechowywania lub dostępu plików cookie w Twojej przeglądarce.

Rozumiem

Cybersecurity

BSB offers comprehensive security solutions for accessing Internet resources based on the technologies of our partners, in particular the solutions of Fortinet, Thales (former Gemalto SafeNet), which are market leaders in cyber security. We provide products that protect every element of a Customer’s infrastructure against internet threats.

Why the solutions offered by the BSB?

As well as innovation, our solutions offer:

  • Easy management of the infrastructure.
  • Very good performance-to-price ratio.
  • Easy implementation.
  • Compatibility with third-party solutions.

We invite you to learn more about our comprehensive product range. We are at your disposal for any questions you may have or to help you choose the right solution:

Security of network and databases

  • FortiGate

Fortinet’s flagship product UTM (Unified Threat Management), which is also the most important element of network security.

Its functionality goes far beyond a standard firewall, providing also IPS (Intrusion Prevention System) protection, AntiVirus, WebFilter, WebProxy, as well as basic DDoS, Anti-Spam, WAF (Web Application Firewall) and Load Balancing functionalities. The high effectiveness of the FortiGate as a security device is confirmed by tests carried out by independent institutions, and a whole team of people working on detection and identification of new threats – FortiGuard.- works on the validity of AV and IPS signatures. The key is to have a subscription for signature database updates.

Necessary for: any company with an Internet connection, so actually nowadays for everyone. Several models of FortiGate devices, with different performance levels, allow the device to be scaled according to the current needs and anticipated growth of the customer’s network.

  • FortiAnalyzer and FortiSIEM optionally

Both devices are used to collect logs from network devices and servers, store them centrally, analyse, and in addition FortiSIEM has the ability to correlate logs and advanced filtering according to user-programmable rules.

These devices can generate reports giving a deep insight and knowledge of the structure of network traffic in our company, they can document detected threats, they can create statistics on traffic and employee activity on the Internet. They have a built-in redundant set of hard disks ensuring reliability and a large capacity for stored data.

 Necessary for:  medium and large companies with extensive network or server structures or for companies obliged by law to collect and store logs (Internet service and telecoms providers).

  • FortiManager

It is a device used to manage a set of Fortinet’s devices in one place.

We can imagine a company with 50 branches in Poland, where each of the FortiGate devices protecting a single branch would be managed and configured separately. The workload and delays in modifying the configuration of these devices would be considerable. Central management ensures an easy way to make changes that will be automatically spread to all devices in the group. The FortiManager also has a lot of the functionality of the FortiAnalyzer and in many cases it can work as a log collection point in our network eliminating the need to purchase a separate device for this purpose.

 Necessary for: companies with multiple devices of one type performing similar functions on the network.

  • FortiClient

It is a user end-station security providing host anti-virus protection, as well as acting as a tool to check and enforce security policies on the end-station.
It communicates and collaborates with the FortiGate and it is also Fortinet’s corporate VPN client for IPSec and SSL VPN connections

 Necessary for: employees’ workstations to complement user-side network protection. 

  • FortiDDoS

At the edge of the Internet either directly or behind the layer of edge routers, there should be a FortiDDoS, which is a dedicated device for detecting and securing networks against Distributed Denial of Service attacks.

This device deletes sessions originating from „zombie” stations, i.e. robots that attack in order to our company’s resources were consumed – i.e. loading on the Web, DNS servers or our other services in order they were unavailable to our real customers.

Necessary for:  companies of which business relies mainly on online services (banks, e-shops, web hosting companies, companies that solicit business via the Internet, companies that are sensitive, due to the goods they produce, to temporary blockage of their network resources).

  • antyDDoS for demanding clients

Protection against DDoS attacks aimed at saturation of the Internet connection (bandwidth 2Gbps, 4Gbps, 8Gbps, 10Gbps and more)

  • FortiWeb

Advanced, dedicated device to protect web servers in our network.

It is a welcome addition to the FortiGate if you want to provide web services externally, e.g. hosting services, application sharing services for external customers, SaaS. To provide such services on the Internet we need to create a rule on the firewall allowing http, https or other traffic into our network, depending on the application. This is a potential gateway that an intruder can use to attack our network. It then becomes necessary to install a device that accurately analyses traffic on ports passed through a firewall. The FortiWeb also has URL manipulation functionalities, e.g. redirection, terminating SSL sessions in HTTPS, load balancing.

Necessary for: medium and large companies of which business is based on providing websites and applications on the internet (e.g. information portals, hosting companies, banks).

 We additionally offer to extend FortiWeb security with HSM cryptographic devices (Gemalto).  Storage of cryptographic material (e.g. certificates, encryption keys, etc.) on the device ensures that only authorised users and applications have access to the material.

  • FortiMail

Advanced, dedicated solution to protect Company’s email servers. It includes anti-spam, anti-phishing, anti-malware, data leakage prevention (DLP), encryption and mail archiving.

Necessary for:  medium and large companies providing e-mail services, e.g. companies which give the opportunity to create e-mail accounts for external users, advertising agencies, „direct marketing” agencies, including those sending unsolicited messages.

  • FortiSandbox

It is a device with dedicated virtual environments to observe the behaviour of suspicious code to detect the latest threats, the so-called ZeroDay.

The ZeroDay threats are the most dangerous on the Internet, due to the fact that they are new, as yet unidentified threats for which there are no signatures and therefore there are no methods to prevent the attack using the given code. The FortiSandbox observes code execution in a separate environment and can identify suspicious or dangerous behaviour and block the spread of malicious code in our network. The FortiSandbox cooperates with the FortiGate, FortiWeb, FortiMail and FortiManager devices by receiving the code from these devices for analysis and returning information such as “block” – suspicious code or “pass” – no threat.

Necessary for:  companies and institutions which, due to the nature of their business, will be particularly exposed to the possibility of an attack using the ZeroDay code, and have particularly „interesting” resources for criminals – government institutions, banks, public administration institutions – ZUS, Tax Offices, institutions collecting and storing sensitive personal data.

  • FortiADC

They are advanced and high-performance load balancers that support the provision of web applications to the internet.

Necessary for: large companies providing content that is particularly interesting online and they generate a significant traffic, e.g. information portals, auction sites, banks .

  • FortiWiFi i FortiAP

These are solutions to ensure the security of the wireless network.

In the case of FortiWiFi, it is a FortiGate unit with radio modules for the WiFi network and it uses the wifi network as another FortiGate interface. FortiAP, on the other hand, are wireless base stations or standalone, or they operate under the control of a FortiGate unit that enable to construct any wireless network structure within a company.

Necessary for: any company using a wireless network for employees or guests.

  • Cryptographic solutions

 „Safe” of keys and certificates based on the SafeServerT application

  • idGUARD

BSB’s proprietary solution for the management of users’ identity and their access to IT systems used in the organisation. idGUARD was created in order to register and control user rights, facilitating management of access to a large number of business applications and licences used in the company and at the same time helping to meet audit requirements..

Necessary for: any company using a large number of business application licences.

  • Comprehensive BSB security system

If you choose the BSB’s offer, you will be provided with a professional advice in choosing the right solutions for your company, as well as numerous benefits and advantages that will not only increase your security, but, above all, allow you to keep your business stable.

As the BSB, we offer you a comprehensive security system that enables you to:

  • transfer resources to a secure server room at the BSB
  • hire ICT resources at the BSB and maintain applications

This means that you no longer need to build your own IT environment and purchase multiple products, but instead you will take advantage of BSB’s comprehensive service including professional advice and secure use of our Data Centre, which will ensure security for your company and enable you to keep your business stable. To provide the service at the highest level is possible thanks to:

  • DataCenter– built on the basis of a Primary Centre and a Backup Centre equipped with the necessary attributes to provide IT services, based on security standards appropriate for banking institutions. This is not only protection against threats from the Internet – it also ensures the security of the DataCentre infrastructure in terms of physical security, continuity of power supply, continuity of access to resources, climatic conditions, etc
  • Highly qualified technical and administrative IT staff.

Thanks to our offer, you will obtain

Financial benefits

  • Low investment and operating costs
  • Reduced risk of investment entry and exit
  • Quick start-up of projects

Operational benefits

  • Access to applications from customer’s subnets or geographical areas, using any device
  • Higher quality of work
  • Support for development and organisation

Technological benefits

  • Flexible use of operational resources
  • More time for business support
  • Access to the state-of-the-art technologies