index

index
[vc_row][vc_column][rev_slider_vc alias=”slider-en”][/vc_column][/vc_row][vc_row][vc_column css=”.vc_custom_1480225428087{background-color: #0099da !important;}”][vc_column_text css=”.vc_custom_1480224841237{background-color: #0099da !important;}”]

Sama Security Team

The more our world become digital, the deeper and wider we become vulnerable. It is the time to take the right decision and chose the correct security and defense parameters before the hackers take the control of your digital world. Believe it or not,you are just a click away from being hacked. Sama Security Team – a subsidiary of Sama Holding provides the most up-to-date solutions and technologies to protect your digital worlds against cyber criminals and cybersecurity incidents.Being the official partners of internationally recognized brands such as Acunetix, F-secure, Heimdal, Stormshield, Neusoft, Wosign, Entrust and many others , enable us to secure the digital life and work of our clients.

Join us to enjoy the safety of being together!

[/vc_column_text][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column][vc_empty_space css=”.vc_custom_1482041903289{background-color: #eeeeee !important;}”][orane_features title=”our products” details=””][orane_single_feature title=”Antivirus” icon=”fa-shield” link=”url:http%3A%2F%2Fsamasecurity.ir%2Fen%2Ff-secure%2F||”]SAMA GROUP is official agent of F-SECURE in Iran.[/orane_single_feature][orane_single_feature title=”Anti ransomware / Malware” icon=”fa-bug” link=”url:http%3A%2F%2Fsamasecurity.ir%2Fen%2Fanti-malware-ransomware%2F||”]Heimdal is the ultimate protection you need to defend against malware and ransomware.[/orane_single_feature][orane_single_feature title=”Firewall” icon=”fa-align-justify” link=”url:http%3A%2F%2Fsamasecurity.ir%2Fen%2Ffirewall%2F||”]SAMA GROUP is the official agent of STORMSHIELD and NEUSOFT in Iran.[/orane_single_feature][/orane_features][orane_features title=”” details=””][orane_single_feature title=”Web Scan – Acunetix” icon=”fa-search” link=”url:http%3A%2F%2Fsamasecurity.ir%2Fen%2Facunetix-software-scanners-introduction%2F||”]As the official and certified partner of Acunetix in Iran, we help you to find out your vulnerabilities.[/orane_single_feature][orane_single_feature title=”SSL certificates” icon=”fa-check-square-o” link=”url:http%3A%2F%2Fsamasecurity.ir%2Fen%2Fcertum-ssl%2F||”]SSL is one of the-must-have tools you need to make your web site safe and immune against Phishing[/orane_single_feature][orane_single_feature title=”Penn Security consulting” icon=”fa-eye” link=”url:http%3A%2F%2Fsamasecurity.ir%2Fen%2Fsecurity%2F||”]Application pen test
Network pen test
Desktop solution pen test[/orane_single_feature][/orane_features][orane_welcome_banner title=”F – Secure| Antivirus |” details=”And the most powerful malware detection and protect your information security throughout the organization using Amenii Virus F – Secure in versions of Windows, Mac, Mobile (Android) and Linux” image=”2450″][/vc_column][/vc_row][vc_row][vc_column][orane_vc_banner_side_image title=”Web Scan |Acunetix|” link_title=”Read More” image=”2697″ image_bg=”2695″ link=”url:http%3A%2F%2Fsamasecurity.ir%2Fen%2Facunetix-software-scanners-introduction%2F||”]Website security must be a priority in any organization but remains overlooked. Hackers continue to concentrate on web-based applications – shopping carts, forms, login pages, dynamic content, etc. Web applications are accessible 24/7 and control valuable data since they often have direct access to back-end data.
Any defense at network security level will provide no protection against web application attacks since they are launched on port 80 – which has to remain open. In addition, web applications are often tailor-made therefore tested less than off-the-shelf software and are more likely to have undiscovered vulnerabilities.
Acunetix automatically crawls and scans off-the-shelf and custom-built websites and web applications for SQL Injection, XSS, XXE, SSRF, Host Header Attacks & over 3000 other web vulnerabilities.[/orane_vc_banner_side_image][/vc_column][/vc_row][vc_row][vc_column][orane_fact_bar title=”Anti-Malware Anti-Ransomware” link_title=”Read more” bgimage=”2448″ link=”url:http%3A%2F%2Fsamasecurity.ir%2Fen%2Fanti-malware-ransomware%2F||”]Nowadays there is an ever growing number of malicious components that can jeopardize yours or your computer’s security by providing others with access to your documents through various backdoors.Although there is no standard way of keeping your files secure, it is possible that you can lower the chance of a cybernetic attack by using third-party software solutions such as Heimdal PRO.[/orane_fact_bar][/vc_column][/vc_row][vc_row][vc_column][/vc_column][/vc_row][vc_row][vc_column][orane_vc_banner_side_image title=”Services | SSL |” link_title=”Read More” image=”2747″ link=”url:http%3A%2F%2Fsamasecurity.ir%2Fen%2Fcertum-ssl%2F||” image_bg=”2682″] SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser, or a mail server and a mail client (e.g., Outlook).

SSL allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely. Normally, data sent between browsers and web servers is sent in plain text—leaving you vulnerable to eavesdropping. If an attacker is able to intercept all data being sent between a browser and a web server, they can see and use that information.

More specifically, SSL is a security protocol. Protocols describe how algorithms should be used. In this case, the SSL protocol determines variables of the encryption for both the link and the data being transmitted. [/orane_vc_banner_side_image][orane_vc_gtstarted_banner title=” | Penetration test | Services ” image=”2467″ link=”url:http%3A%2F%2Fsamasecurity.ir%2Fen%2Fsecurity%2F||”]Penetration test is to discover ways and methods of unauthorized access to sensitive and confidential information resources of organizations, in the shortest possible time. The purpose of the tests to find out the weaknesses in systems and offer solutions for overcoming them. In the process of penetration testing, the experimenter addition to having independent approach to each vulnerability, to combine them to simulate a realistic scenario is concerned. This leads to more accurate understanding of the potential damage that may be caused by events computer information systems and network organizations are exposed.
Sama penetration testing services equip the system with the following characteristics are presented:
Permeability test web applications
Network penetration test
Permeability test desktop apps[/orane_vc_gtstarted_banner][/vc_column][/vc_row][vc_row][vc_column][orane_vc_latest_blog title=”Latest News” readmore=”Read More”][/orane_vc_latest_blog][/vc_column][/vc_row][vc_row][vc_column][/vc_column][/vc_row][vc_row][vc_column][/vc_column][/vc_row][vc_row][vc_column][/vc_column][/vc_row]