All-IN-ONE is THE IT Security Solution from PT SYDECO it is based on the principles
of ZERO-TRUST and is designed to prevent cyber-attacks such as Ransomware or data breaches, in the
event of an attack, allowing computer networks to continue to function by preventing viruses or
worms have any effect and prevent lateral contamination in the tissue.
All-IN-ONE IT Security Solution from PT Sydeco focuses on protecting the
resources (all data and computing services) of an establishment or enterprise, such as assets, data,
services, workflows, networks. Sydeco's ALL-IN-ONE IT Security Solution protects all enterprise
assets (devices, applications, virtual and cloud components) and subjects (end users, applications
and other non-human entities requesting information from resources).
All-IN-ONE Cybersecurity Solution from PT Sydeco secures all
communications, all data transfers regardless of where the network is located. All-IN-ONE IT
Security Solution from PT Sydeco is fully auditable, so that the state of assets as well as the
integrity and security posture of all owned and related assets can be observed.
PT Sydeco's ALL-IN-ONE IT Security Solution, thanks to its Micro Segmentation Architecture
to reduce the attack surface, limits attack impact and prevents lateral contamination within the
enterprise.
Figure 1: ALL-IN-ONE (Archangel, SP-One & SST) protect Programs and Data
A. Network Security
The company's computer network, in any enterprise or establishment is protected by
ARCHANGEL©, an advanced firewall created by PT SYDECO which is one of the
components of the All-IN-ONE IT Security Solution.
ARCHANGEL© protects servers, computers and other connected objects from
cyber-attacks originating from the outside world and prevents the spread of lateral virus
contamination within the company.
Servers, computers that are on the company's internal network and which are connected to
ARCHANGEL© itself are protected by SP-One©.
SP-One©, which is another component of the ALL-IN-ONE IT Security Solution, is a
program and system that creates an airtight, secure shelter around source code or programs used in
office, administration, or university computer networks. Cloud and in SaaS.
SP-One© protects servers, programs or Source Code against any cyber-attacks from the outside world
and against those coming from within private computer network.
Figure 2: ALL-IN-ONE (Archangel, SP-One & SST) protect Servers
Enterprise computer network security is enhanced by the ALL-IN-ONE Micro Segmentation
Architecture. Thanks to the Micro Segmentation Architecture, users can only access the
servers they need to work on and after being registered as authorized users.
Figure 3: Zero Trust & Micro Segmentation protect programs against lateral
contamination
It follows that if a user accidentally or intentionally contaminates his computer, the virus or worm
he has downloaded can only try to attack the server he is connected to. And this server is protected
by SP-One, so not only the user will not be able to infect the server connected to it but also no
other server in the network.
B. Mobile Data Security
All data moving within the internal network or outside, in the outside world, is protected by SST©,
Secure System of Transmission, which is another creation of PT SYDECO, and delivered inside the VPN.
SST© protects data by encrypting it without using a key, without any third party intervention, using
artificial intelligence to do so.
SST© also protects all passwords used in the All-IN-ONE IT Security System.
VPN are created by ARCHANGEL and encrypted by SST©.
This is E2E protection and only the receiver can read the data. The data will disappear if someone
tries to intercept it.
C. Security On data at rest
Backup Data is protected by SP-One and by Logic Micro Segmentation Architecture used by ALL-IN-ONE
systems. Finally all data even when at rest, is encrypted by SST©.
D. Security Of The Industrial Control Systems (ICS) Endpoints'
ALL-IN-ONE protects ICS endpoints from SCADA (Monitoring Control And Data
Acquisition) or DCS (Distributed Control System) against worms such as StuxNet, or viruses such as
ShaMoon or Trojan Horses such as BlackEnergy and will avoid disruptive activities or services.
ALL-IN-ONE protects ICS ENDPOINTS' as a whole, servers,
communication networks through which data and instructions pass, data itself, terminals and
individual components.
2. ZERO TRUST ARCHITERTURE
The ZERO TRUST ARCHITECTURE of the ALL-IN-ONE system, by partitioning the enterprise network into
sub-systems, namely the enterprise network, control network and industrial network, which are
separated from each other by security devices such as firewalls, ARCHANGEL ONE WAY, reduces the
exposure of industrial infrastructure to threats and prepare systems for enhanced installation
monitoring and incident detection.
Of course, the security of any device, any server, program, data, depends not only on the element of
material protection but also and most importantly on respecting the strict policies governing access
to the installation, its use and behavior in case of a problem.
Figure 4: Zero Trust Architecture & Micro segmentation of ALL-IN-ONE protect DATA: They are in
a DMZ (Demilitarized Zone)
But, thanks to the ZERO TRUST architecture and the elements that made it up,
including the ARCHANGEL ONEWAY, or SP-One, there will be no more:
- Disruption in the services or operation of the ICS for example, due to blockage, delay in the flow
of information, destruction or malicious encryption
- Unauthorized modifications to the system or its deactivation due to unfriendly penetrations or
instructions that are illegal and harmful and which are of a nature such as to cause enormous human,
material or financial damage,