Our product, eGambit is able to fight against advanced offensive activities targetting large scale infrastructures (cyber-spy, cyber-sabotage, stealth operations, etc). By deploying eGambit, this additionnal layer of security can detect and respond against major known and unknown threats such as ransomware attacks, intrusions inside systems or applications, known and unknown viruses, or even data breaches against sensitive data stored on these businesses.
eGambit can be deployed in worldwide large-scale environments, thanks to many advanced technical features.
You can find many articles about us in the press. Here are related samples.
In order to follow major standards, TEHTRIS Company applies ISO 27001 standard. This table below summarizes the main list of internal elements at TEHTRIS, linked to our ISMS and to our ISO 27001 direction.
|00 Procedure for Document and Record Control||Procedure for Document and Record Control||EN|
|02 Procedure for Identification of Requirements||Appendix List of Legal Regulatory Contractual and Other Requirements||EN|
|03 ISMS Scope Document||ISMS Scope Document||EN|
|04 Information Security Policy||Information Security Policy||EN|
|05 Risk Assessment and Risk Treatment Methodology||Appendix 3 Risk Assessment and Treatment Report||EN|
|05 Risk Assessment and Risk Treatment Methodology||Risk Assessment and Risk Treatment Methodology||EN|
|06 Statement of Applicability||Statement of Applicability||EN|
|08 Annex A.6 Organization of information security||Mobile Device and Teleworking Policy||EN|
|08 Annex A.7 Human resource security||Confidentiality Statement||EN|
|08 Annex A.7 Human resource security||Statement of Acceptance of ISMS Documents||EN|
|08 Annex A.7 Human resource security||Confidentiality Statement external||EN|
|08 Annex A.7 Human resource security||Déclaration d'acceptation des documents du SMSI||FR|
|08 Annex A.7 Human resource security||Déclaration de confidentialité||FR|
|08 Annex A.8 Asset management||Acceptable Use Policy||EN|
|08 Annex A.8 Asset management||Information Classification Policy||EN|
|08 Annex A.9 Access control||Password Policy||EN|
|08 Annex A.11 Physical and environmental security||Clear Desk and Clear Screen Policy||EN|
|08 Annex A.11 Physical and environmental security||Procedures for Working in Secure Areas||EN|
|08 Annex A.11 Physical and environmental security||Disposal and Destruction Policy||EN|
|08 Annex A.12 Operations security||Backup Policy||EN|
|08 Annex A.12 Operations security||Operating Procedures for Information and Communication Technology||EN|
|08 Annex A.13 Communications security||Information Transfer Policy||EN|
|08 Annex A.14 System acquisition development and maintenance||Secure Development Policy||EN|
|08 Annex A.15 Supplier relationships||Supplier Security Policy||EN|
|08 Annex A.15 Supplier relationships||Appendix Security Clauses for Suppliers and Partners||EN|
|08 Annex A.16 Information security incident management||Incident Management Procedure||EN|