SOLUTIONS

Create value by combining cutting edge products with a high level of expertise

Our CESAME© Solution

CESAME© is the “all-in-one” mobile device management solution from Abakus Sécurité.

With a customized administration portal, we enable our clients to manage their mobile devices with dedicated operational support from Abakus Sécurité.

We have been offering this platform since 2016, delivering industrial-grade services based on the best tools available on the market.

CESAME includes the following services:

Conseil & coaching

The Abakus Sécurité team provides consulting and coaching services for the management of your UEM (Unified Endpoint Management) environment. We can support you throughout your project lifecycle, regardless of the maturity of your mobile fleet, to align the platform’s capabilities with your infrastructure and needs. To facilitate the integration of the platform into your company, we offer support in the following areas:

  • Protecting your company’s value against new threats and data leaks
  • Managing the security of mobile devices
  • Adapting to your Information System without interfering with your employees’ personal environments
  • Controlling unauthorized deployment of new devices
  • Ensuring compliance of devices, including BYOD, within your Information System

Our teams are certified and possess expertise drawn from their operational and functional experiences to support you with competence and professionalism, sharing their knowledge every step of the way.

Integration & deployment

We have the expertise to plan, install, configure, optimize, troubleshoot, and administer your UEM platform. Our approach is divided into four key stages:

  • Launch (context analysis)
  • Prototyping
  • Environment preparation
  • Device deployment

This also demonstrates our hands-on, practical field experience in successfully implementing your UEM deployment.

Technical Support

Free yourself from support tasks: thanks to our dedicated CESAME team, you can relieve your staff of administrative and operational technical tasks, allowing them to focus on their core responsibilities. Our consultants hold the latest certifications and have extensive hands-on field experience.

CESAME clients benefit from support services available by phone or email.

Training

Abakus Sécurité is also an accredited training provider.
Our UEM consultants organize a series of practical training sessions to share their expertise on managing a UEM platform with your security and support teams.

We offer remote training sessions (via Webex and remote labs) as well as on-site training.
Our courses and exercises are conducted in French, developed, and continuously improved based on feedback from our services.

Pricing

CESAME is priced based on the number of mobile devices managed and the desired features.

There are four options for annual subscriptions:

Augmented Graphical Investigation

With its dynamic access to new sources of information, Abakus FACETS offers enhanced workflows between data and IBM i2 Enterprise Insight Analysis.

Save time, improve your responsiveness and performance by identifying hidden relationships you may have overlooked.

A complete solution ready to use

Coverage

?
 

Abakus FACETS allows users to expand greatly their field of investigation.

Immediate

?
 

Data can be used very quickly.

Efficiency

?
 

Analysts can focus on their job: analysis !

Serendipity

?
 

Discovering hidden relationships within a large dataset is made easier with Abakus FACETS.

Abakus Sécurité, one single point of contact for Abakus FACETS:

Consulting – Installation – Set up – Integration – Training

Professional and user-friendly interfaces for analysts

Abakus FACETS is an “orchestrator” providing a secure engine to convert technical data into valuable business information to feed IBM i2 Enterprise Insights Analysis.

Ten customizable menus according to user rights, enable a quick navigation to manage connectors to data sources, build and save queries, match collected data and the “entity-link-property” model. Specific menus for administrators and the auditor give access to control functions and to set-up.

For more information, please ask for your free copy of our Abakus FACETS Technical and Functional Description

We are OPEN !

Tailor-made solutions can be designed and developed by the Abakus Securité experts to meet customers technical and functional requirements

Based on Open Source components such as MISP, Suricata, Kibana, Elasticsearch, etc, these solutions will be designed in cooperation with Abakus Sécurité customers and experts.

Abakus Sécurité experts will assist you from design to production of your “Open Source” Cyber Security solution.

25 years of experience and confidence

With 39 IBM Professional Certifications, Abakus Securité provides the highest level of expertise for:

  • IBM MaaS360 to manage and to protect your mobile devices
  • IBM QRadar to provide deep visibility into network, user, and application activity
  • IBM Resilient to automate security operations and to respond faster and more efficiently to cyber threats
  • IBM i2 & EIA, to help you identify vulnerabilities and disrupt threats

All these products make benefits of IBM Watson’s capabilities.

Abakus Securité is IBM Gold Business Partner
Certified 2020 Experts for IBM Security 2 domains of expertise:

  • Digital Trust
  • Threat Management

Partnerships with cybersecurity market leaders

Abakus Sécurité offers other solutions for which its experts are certified to the highest level:

  • KnowBe4, the world leader in phising test and user training
  • Gigamon, the award-winner solution to eliminate blind spots across a network and to detect encrypted and hidden command-and-control channels and other malware activities
  • Gatewatcher, probes designed to detect suspicious or malicious activity by analyzing network flows, ANSSI certified
  • Picus, the pioneer of Breach & Attack Simulation technologies
  • syslog-ng Store Box, a high-performance, high-reliability log management appliance based on Open Source components
  • Outpost24vulnerability management tool
  • Palo Alto, The rollout of our new Secure AI by Design portfolio has begun!

These solutions have been successfully implemented in customers environment by Abakus Sécurité experts.