Torus Technologies

Security Solutions

Discover. Protect. Monitor.
about

We Are Torus Technologies

Security is our business. We strive to build long-term collaborative customer relationships to develop and deliver a proactive security strategy as your security needs evolve and change. Our team members are your security partners and trusted advisors.

The leadership team at Torus Technologies has more than 30 years combined experience working with medium and large healthcare facilities, energy and utility companies, manufacturing companies, retail corporations, state and local government and education entities, financial institutions, and other industries in the commercial field.

No two networks are alike. Organizations need solutions that can be flexible enough to fit their specific business and risk requirements.We help you understand what’s really happening on the network with appliance and end point analysis.

services

Our Services

The cyber threats facing enterprises today are sophisticated, wide ranging, and highly targeted.

data-breach-risk

Next Generation Firewall allows for complete visibility and control across all layers, including signaling, data and control plane, with application-layer visibility. To protect your network from cyber attacks and improve your overall security posture, it’s important to safely enable applications across all ports, for all users, at all times while simultaneously scanning traffic for both known and new threats.

Advanced Email Security provides the tools you need to keep your people safe from email threats. We enhance your ability to protect against fast-emerging threats such as impostor email and phishing. We also help block better understood threats such as spam, bulk email, and viruses, protecting your people, data, and brand from today’s threats and common nuisances.

Scalable Performance Monitoring ensures that the network is performing optimally for application delivery across hybrid, physical, virtualized, and software-defined network environments. The ability to trace all network flows allows for a deep source of insights for isolating anomalies in network and application behavior and mitigating risks before they impact end-users or IT security.

advanced-malware-security

Orchestration and Automation brings together disparate tools to give your team greater control over the incident response process for improved efficiency. This mechanism eliminates errors through standardized process and automation while reducing time demands on already stretched security teams.

Privileged Access Security protects privileged accounts that are used to maintain systems, facilitate automated processes, safeguard sensitive information, and ensure business continuity. Privileged accounts are exploited in nearly every cyber attack. Bad actors can use privileged accounts to disable security systems, to take control of critical IT infrastructure, and to gain access to confidential business data and personal information.

Advanced Endpoint Prevention & EDR provides a comprehensive analysis of endpoint behavior over time, not just files to detect and stop threats. It has the ability to capture and store unfiltered data from every endpoint to analyze each event stream in context to uncover emerging attacks. As a result security teams have the ability to immediately triage alerts by isolating endpoints, blacklisting applications, or terminating processes.

social-engineering-security

Security Awareness Training provides an interactive training platform giving your users a fresh new learner experience that makes learning fun and engaging. By starting to identify risk at the user, group, and organizational level this platform helps make data driven decisions when it comes to your security awareness plan. Guided by next level reporting for phishing and training campaigns, it helps you measure the effectiveness of your security awareness training program.

Enterprise Exposure and Security Strategies enhance your team’s operational skills and improve their ability to prevent, detect, and respond to cyber attacks. They provide the ability to evaluate your organization’s cyber crisis processes, tools and proficiency in responding to cyber attacks from both an executive strategic and technical incident response perspective. Each exercise introduces multiple scenarios based on real world experience in a roundtable environment to observe the organization’s simulated actions and decisions in response.

Fact Based Risk Analysis creates a clear picture of current activities and enables you to make effective and affordable decisions about what your organization needs in terms of cyber security. You can communicate those needs to executives who manage the budget and to better plan for new regulations and reporting requirements.

partners

Our Partners

contact

Contact

Address:

941 25th Ave. #232
Coralville, IA 52241

Phone:

319.248.5502

Email:

info@torusinc.com

Get In Touch

    Your Name (required)

    Your Email (required)

    Subject (required)

    Your Message

    events-two
    Loading Events

    Past Events

    Events Search and Views Navigation

    December 2019

    Webinar with Accedian’s Michael Rezek

    December 5, 2019 @ 11:00 am - 12:00 pm

    Do you know the evil lurking on your wire? Join us for a webinar with Accedian's Michael Rezek, VP of Business Development and Cyber Security Strategy on December 5th, 2019 at 11AM CST. Accedian has partnered with Splunk to create a next-gen network traffic analysis (NTA) solution that will augment endpoint and perimeter security. This solution can detect suspicious lateral traffic within the modern enterprise environment. Skylight™ security app for Splunk is able to provide high fidelity alerts with a combination of…

    Find out more »

    Torus Technologies & FireEye Happy Hour

    December 11, 2019 @ 3:00 pm - 6:00 pm
    Tin Roost, 840 W. Penn St.
    North Liberty, IA 52317 United States
    + Google Map

    Reduce Cyber Risk with Security Instrumentation and Expertise on Demand Join Torus Technologies & FireEye for happy hour on Wednesday, December 11th  | 3:00 p.m. - 6:00 p.m. at Tin Roost in North Liberty Join us for happy hour at Tin Roost in North Liberty on Wednesday, December 11th from 3:00-6:00 PM as we share a new approach to validating your cybersecurity effectiveness. Major General Earl Matthews will be on hand to answer questions and share how the Verodin Security Instrumentation Platform provides…

    Find out more »

    Torus Technologies & FireEye Lunch

    December 12, 2019 @ 11:30 am - 1:00 pm
    Iowa Taproom, 215 E 3rd St #100
    Des Moines, IA 50309 United States
    + Google Map

    Extend Your Security Team with Access to Leading Expertise, Threat Intelligence & Mandiant Services Join Torus Technologies & FireEye for Lunch Thursday, December 12th | 11:30 p.m. - 1:00 p.m. at Iowa Taproom Downtown Des Moines According to ESG, in 2018-2019, 53% of organizations report a problematic shortage of cyber security skills, up from 45% in 2016-2017. Join Torus Technologies and FireEye for lunch at Iowa Brewing on Thursday 12/12 as we share ways to close the cyber skills gap and reduce…

    Find out more »

    September 2020

    EISC Presents: Mid-pandemic Cyberthreat Update

    September 22 @ 10:00 am - 11:00 am

    Join us and John Sileo for a webinar: Mid-pandemic Cyberthreat Update Cybercriminals love to exploit crisis. While our attention is focused elsewhere (e.g., COVID-19 and the economy), hackers take advantage of the new software we are using (Zoom), highly-profitable scams (fraudulent workplace pandemic updates) and our general sense of panic and confusion. Taking smart steps to protect your data is critical in times of crisis. This webinar with cybersecurity author and expert John Sileo is a brief, high-level introduction to…

    Find out more »
    + Export Events
    front-page