Netwave LLC

Netwave LLC icon

icon Kyiv, Ukraine

icon Est. 2011

icon 41-60

About

Since 2011, we have been designing and building information networks and computer systems and implementing information security solutions

We specialize in providing services in the field of cybersecurity, corporate networks and data management such as:

- Risk Based Vulnerability Management (RBVM)

- Penetration Testing

- Security Assessment

- Code Analysis

- Data Masking

- Network Design

We also have a Technical Support Services (TSS) team at various levels.

 

OUR COMPETENCIES AND VENDORS

 

Comprehensive cybersecurity solutions (CyberSec):

Vendors: CrowdStrike, ESET, Trellix, Cisco, Fortinet, Tenable, F5, Forcepoint, Delinea, Splunk, Picus;

Areas:

1. Endpoint protection (EPP, EDR): ESET, Trellix, CrowdStrike, Cisco, Fortinet

2. Vulnerability management IT/OT/WEB: Tenable

3. Protection of services: - Identity protection: Tenable, CrowdStrike - Web Application Firewall: F5, Fortinet - Mail Security Gateway: Fortinet, Cisco, Trellix - MFA: Cisco, ESET, Fortinet

4. Data Loss Prevention (DLP): Trellix, Forcepoint, ESET

5. Control of privileged users (PAM): Delinea

6. Cloud access security broker (CASB): Trellix, Forcepoint

7. Log collection and analysis, incident management (SIEM/SOAR/UEBA): Splunk

8. Proactive security, attack simulation (BAS): Picus

9. Cloud protection (CNAPP/CSPM/CIEM/CWPP/KSPM/IaC/Cloud Detection and Response): Tenable, CrowdStrike

10. Services: Risk-based Vulnerability Management (RBVM), Security Control Validation (SCV), TSS

 

Networking

Vendors: Cisco, Aruba, Fortinet, Juniper;

Areas:

1. Corporate networks (LAN/Wi-Fi/WAN, SD-WAN, SD-LAN, Enterprise Management & Monitoring)

2. Data center networks (DC Classic, SD-DC, DC Management & Monitoring)

3. Network security (NGFW, NAC, NTA, SWG, SSE, DDoS Protection, Security Management & Monitoring)

 

Computing

Vendors: NetApp, IBM, HPE, DellEMC, VMware, Commvault;

Areas:

1. Virtualization and Clouds (Computing Virtualization (DC), Storage Virtualization (DC), Network Virtualization (DC), Workplaces and Applications Virtualization (Remote work), Hybrid Cloud Platform, Virtualization Management and Automation, Cloud services based on Hyperscalers and СP, Cloud Management and Automation, Container Solutions)

2. Infrastructure components (Server for high-performance tasks, Server for productive tasks, virtual infrastructure, Entry-Level Server, High-performance Storage, Object Storage, File Storage, Entry-Level Storage, SAN)

3. Ensuring reliability (Disaster Recovery, Backup and Restore)

4. Application level (OS, Office SW, Databases)

 

Data control (Data Management)

Vendors: Delphix, IBM VDP, DataSunrise, Micro Focus, OpenText;

Areas:

1. Database management (Virtualization of databases and applications, control and audit of access to the database) 

2. Data management and security (Data masking, Data encryption)

3. Software security (Checking source code and software for SAST, DAST, RAST vulnerabilities)

Services
Cybersecurity 40%
IT Managed Services 60%
Domains
  • Cybersecurity
Technology Stack
  • Cybersecurity Technologies

Package Offers

img

RBVM

Risk Based Vulnerability Management

Price starting from $5000
Timeline within 1 month
img

Pentest

Penetration testing for IT infrastructures

Price starting from $4000
Timeline within 1 month
img

Code Analysis

Security analysis of source code and software components

Price starting from $3000
Timeline within 1 month
img

SCV / BAS

Breach Attack Simulation / Security Control Validation service

Price starting from $5000
Timeline within 1 month
img

Data Masking

Data masking for different databases

Price starting from $13000
Timeline within 1 month
img

TSS

Technical support services for IT infrastructures

Price starting from $1000
Timeline within 1 month

Why Us

We form an experienced team to work on your project. Qualified pre-sales, implementation, and support engineers will work on each implementation.

We have practical experience and deep expertise. Our team is an expert in implementing comprehensive security solutions and supporting complex integrated solutions using current innovations and proven practices.

We use leading tools and have a high level of expertise in their effective use. We select the best tools among the best solutions in our industry for the specific needs of the client.

We successfully and effectively cooperate with vendor specialists. Close interaction with experts from technology companies allows us to develop and implement optimal and most efficient solutions for our customers.

We apply an integrated approach to the development, implementation and support. As a result, we create fully personalized solutions that are optimally customized to the specific needs of the client and help to achieve maximum efficiency in solving customer problems and obtaining the necessary business results.

We have our own technical support service.

We apply cross-technology and multi-vendor expertise. This approach allows us to work as thoroughly and efficiently as possible to improve our clients' information security.

Have a project in mind?

iconLet’s discuss