FPT Anti-DDoS is the attack protection system, that monitors, alerts and protects customers' systems against distributed denial-of-service (DDoS) attacks.
FPT Telecom Anti-DDoS system protects the internal system and FPT Telecom customers' systems, and also provides anti-DDoS services to external customers, especially for those who use FPT Telecom data transmission lines.
FPT Telecom Anti-DDoS system can identify connections from a botnet and immediately block those connections. Also, FPT Telecom network can carry out data bypass to reduce the load on the systems to prevent them from being overloaded in case if the traffic is too heavy. FPT Telecom provides the extensive network of transmission lines with high bandwidth and advanced pro-effective anti-DDoS solutions optimized for all our customers.
Penetration test and security audit service scans, tests and analyzes the configuration, current status and data log of the information system. It detects vulnerabilities and weaknesses, provides risk assessment and shows all information insecurities.
It is the essential service for all information technology systems. It helps to detect and prevent early threats, enhance compliance with information security policies, and ensure security and confidentiality of important and sensitive information of the systems.
Scanning and penetration test service aims to test and identify weaknesses of the system in order to improve its security and privacy.
Pentest service helps to secure the whole system on every stage: design, deployment, test and operation. Pentest service guarantees:
System safety and security audit service determines the level of system safety and security, ensuring that the system complies with security standards and protocols. Compliance with security standards and protocols helps the system to reduce risks of attacks and ensure its data security.
Examples of system safety and security standards and protocols, which are highly valued for its quality: ISO 27001, PCI DSS, CIS CSC, NIST, etc.
Security system review and optimization service evaluates the optimization and system's safety from design to parameters' configuration of each particular individual system and the whole system in general. Regular reviewing and optimization helps to minimize risks, vulnerabilities and negligence in its operationof the system.
Security Operations Center -- SOC is the centralized unit that deals with security issues. Our security analysts constantly work in this center to detect, analyze, react, report and prevent cybersecurity incidents.
SOC addresses the remaining shortcomings of cybersecurity devices in the system by integrating People, Technology and Operations.
1. Technology. By technology we mean monitoring, analysis, incident detection and incident investigation solutions.
2. People. Our experts in the Security Operations Center are assigned to monitor, coordinate and troubleshoot operations in the system.
3. Operations. This process includes regulations, procedures and information security policies of the system.
All our employees are highly qualified specialists with the necessary knowledge and expertise. All members performs teir particular tasks within the system following the standard procedure.
FPT Telecom provides customers with high-level expert support and advanced security support tools to coordinate customers in case of any information security incidents. FPT Telecom specialists isolate an incident, limit its impact on the system, investigate, find the cause of the incident, then troubleshoot and implement necessary preventive measures to help the system to avoid any similar incidents.
Our team of security experts is highly-qualified and internationally recognized. We are experienced in system deployment and responding to domestic and international information security incidents.
Our assessment procedures and evaluation techniques are compliant with all necessary international and national security standards.