• Careers
  • About us
  • People
EnglishNorsk
Talk to us
  1. Knowledge
  2. Dictionary
Dictionary
min read

Cybersecurity

Cybersecurity protects data systems, networks, and information from digital attacks

What is cybersecurity?

Cybersecurity is about protecting computer systems, networks, and information from digital attacks and threats.

  • Areas within cybersecurity include: Information security, network security, application security, operational security, endpoint security, identity and access management, crisis management and incident response, security architecture and design, security management, compliance and threat intelligence.

  • What cybersecurity aims to protect: Personal data, financial data, intellectual property, trade secrets, customer data, networks, systems, applications, devices and communication.

  • Tools used for protection: Firewalls, antivirus software, encryption, SOC, IRT, multi-factor authentication, intrusion detection systems (IDS), intrusion prevention systems (IPS), backups, security updates, security audits and security training.

Sicra and cybersecurity 

Sicra provides a wide range of services aimed at securing companies’ data and infrastructure. We offer everything from firewalls, SOC, IRT, application security, and secure infrastructure for workstations and devices.

We collaborate with partners such as Arctic Wolf (SOC), River Security (penetration testing), Palo Alto Networks (firewalls, monitoring, and diagnostic tools), Microsoft (security related to the cloud and Microsoft 365), F5 (application security), O3 Cyber (cloud security), and Citrix and Netscaler (network).

Services:

Read about "security monitoring and incident management (SOC)" here >

Read about "regulatory requirements and compliance" here >

Read about "security consulting" here >

Read about "other offerings" here >

Related words: Alert fatigue, Artificial general intelligence (AGI), Artificial intelligence (AI), Data breach, Decryption, DDoS attack, Digital twin security, DORA, FQDN, GDPR, Hash, NIS2, NTLM, Compliance, Cyber Kill Chain, Threat Intelligence, Firewall, Antivirus, Encryption, Kerberos, Authentication, Security audits, Stuxnet, SOC, IRT, NSM, MDR, OT security, SLA, SMB, Feedback loops, Ransomware, Eavesdropping attack, Best practice, Brute force attack, ADC, Bug bounty, River Security, Palo Alto Networks, Arctic Wolf, Microsoft, Microsoft Intune, O3 Cyber, F5, Deep packet inspection (DPI), Exploit kit, Fileless malware, Hacking, Hacktivism, Honeytoken, Juice jacking, Man-in-the-middle (MITM) attack.

Need Assistance?

We are happy to have a non-binding conversation.
Contact us

Tailored cybersecurity for institutions and enterprises that allows for innovation, growth, and fearless performance.

Get in touchCall us +47 648 08 488
Stay updated
Receive the latest news

Links
SustainabilityFAQPartnersCertifications and awardsCareerPress & brand
Contact

Tel: +47 648 08 488
E-mail: firmapost@sicra.no

Rosenholmveien 25, 1414
Trollåsen. Norway

Follow us on LinkedIn
Certifications
iso27001-white
ISO 27001 compliance
miljofyrtarnlogo-hvit-rgb
Eco-Lighthouse
Sicra © 2024
Privacy Policy