Solutions for Large Companies

eGambit for Large Companies

Our product, eGambit is able to fight against advanced offensive activities targetting large scale infrastructures (cyber-spy, cyber-sabotage, stealth operations, etc). By deploying eGambit, this additionnal layer of security can detect and respond against major known and unknown threats such as ransomware attacks, intrusions inside systems or applications, known and unknown viruses, or even data breaches against sensitive data stored on these businesses.

eGambit can be deployed in worldwide large-scale environments, thanks to many advanced technical features.



Applying ISO27001

In order to follow major standards, TEHTRIS Company applies ISO 27001 standard. This table below summarizes the main list of internal elements at TEHTRIS, linked to our ISMS and to our ISO 27001 direction.



ISO 27001

Category Document Lang
00 Procedure for Document and Record Control Procedure for Document and Record Control EN
02 Procedure for Identification of Requirements Appendix List of Legal Regulatory Contractual and Other Requirements EN
03 ISMS Scope Document ISMS Scope Document EN
04 Information Security Policy Information Security Policy EN
05 Risk Assessment and Risk Treatment Methodology Appendix 3 Risk Assessment and Treatment Report EN
05 Risk Assessment and Risk Treatment Methodology Risk Assessment and Risk Treatment Methodology EN
06 Statement of Applicability Statement of Applicability EN
08 Annex A.6 Organization of information security Mobile Device and Teleworking Policy EN
08 Annex A.7 Human resource security Confidentiality Statement EN
08 Annex A.7 Human resource security Statement of Acceptance of ISMS Documents EN
08 Annex A.7 Human resource security Confidentiality Statement external EN
08 Annex A.7 Human resource security Déclaration d'acceptation des documents du SMSI FR
08 Annex A.7 Human resource security Déclaration de confidentialité FR
08 Annex A.8 Asset management Acceptable Use Policy EN
08 Annex A.8 Asset management Information Classification Policy EN
08 Annex A.9 Access control Password Policy EN
08 Annex A.11 Physical and environmental security Clear Desk and Clear Screen Policy EN
08 Annex A.11 Physical and environmental security Procedures for Working in Secure Areas EN
08 Annex A.11 Physical and environmental security Disposal and Destruction Policy EN
08 Annex A.12 Operations security Backup Policy EN
08 Annex A.12 Operations security Operating Procedures for Information and Communication Technology EN
08 Annex A.13 Communications security Information Transfer Policy EN
08 Annex A.14 System acquisition development and maintenance Secure Development Policy EN
08 Annex A.15 Supplier relationships Supplier Security Policy EN
08 Annex A.15 Supplier relationships Appendix Security Clauses for Suppliers and Partners EN
08 Annex A.16 Information security incident management Incident Management Procedure EN