English
English
Azərbaycan
Shqiptare
Հայերեն
Български
ქართული
қазақ
Кыргызча
Македонски
Молдавский
Монгол
Русский
Српски
Slovenščina
Тоҷикӣ
Türk
Türkmenler
o'zbek
Українська
Hrvatski
MUK
  • Countries
    al.pngAlbaniaam.svgArmeniaaz.svgAzerbaijanbg.pngBulgariahr.pngCroatiage.svgGeorgiakz.pngKazakhstankg.pngKyrgyzstanmk.pngMacedoniamd.pngMoldovamn.pngMongoliaae.pngUnited Arab Emiratesrs.pngSerbiasi.pngSloveniatj.pngTajikistantr.svgTurkeytm.pngTurkmenistanua.pngUkraineuz.svgUzbekistan
  • Solutions
    MUK vendorsMUK solutionsCatalogue of products and services
  • News
    News and DealsMUK journalVideo
  • ACTIVITIES
    IT DistributionTraining centerService centerMUK Cloud services
  • About company
    About MUKCorporative profileCareers
  • Dealer section
    al.pngAlbaniaam.svgArmeniaaz.svgAzerbaijanbg.pngBulgariahr.pngCroatiage.svgGeorgiakz.pngKazakhstankg.pngKyrgyzstanmk.pngMacedoniamd.pngMoldovamn.pngMongoliaae.pngUnited Arab Emiratesrs.pngSerbiasi.pngSloveniatj.pngTajikistantr.svgTurkeytm.pngTurkmenistanua.pngUkraineuz.svgUzbekistan

Penta Security

AUTHORIZED DISTRIBUTOR

https://www.pentasecurity.com/

  • AzerbaijanAzerbaijan
  • GeorgiaGeorgia
  • KazakhstanKazakhstan
  • MoldovaMoldova
  • TurkmenistanTurkmenistan
  • UkraineUkraine
  • UzbekistanUzbekistan

Penta Security is an information technology security company founded in 1997 and headquartered in Seoul, Korea. The company is the market leader in the Asia-Pacific region. Penta Security offers solutions to protect web applications, databases and IoT devices.

‍

KEY BUSINESS AREAS:

Web Application Firewall (WAF ) to detect and block attacks on the website. Protects against SQL injections, Brute force URLs, cookie spoofing, hidden field manipulation, OS command injections, XSS vulnerabilities, directory indexing, web settings and admin page violations, malicious file trial loading, which prevents information leakage through web attacks

A high-performance hardware and software platform for protecting web resources with support for virtual devices and cloud environments based on the latest protection method, which includes a logical analysis engine (WAF) - WAPPLES

Database security solution with encryption and decryption and built-in security tools - D’Amo

System for ensuring the confidentiality and integrity of information, user and resource authentication - ISign+

MUK solutions

server_equipment.jpg

Server equipment

data_storage_and_availability.jpg

Data storage and availability

network_hardware.jpg

Network hardware

wireless_networks.jpeg

Wireless networks (Wi-Fi)

internet_of_things.jpg

Internet of things (IoT)

information_security.jpg

Information security

virtualization_and_sys_software.jpg

Virtualization and system software

hyper_converged_infrastructure.jpg

Hyper-Converged Infrastructure

working_with_data.jpg

Working with data

application_software.jpg

Application software

it_management_systems.jpg

IT management systems

enterprise_cloud_products.jpg

Enterprise cloud products

workplaces.jpg

Workplaces

office_solutions.jpg

Office solutions

unified_communications.jpg

Unified communications

engineering_infrastructure.jpg

Engineering infrastructure of the data center

optical_networks.jpg

Optical networks

structured_cabling_systems.jpg

Structured cabling systems (SCS)

physical_security.jpg

Physical security

business_automation.jpg

Business automation

medical.jpg

Medical equipment

© 2008-2023 MUK. All rights reserved.