To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Supply Chain Awards 2023! Two Awards for OPAP
OPAP won two awards at the Supply Chain Awards 2023, organized by BOUSSIAS. A Gold award in the Demand Forecasting & Logistics category and a Silver award in the Overall Supply Chain Quality category. As a member of the OPAP Group, we are very proud to have played a key role in these successes through […]
SOC Visibility Triad: Why is determinant for effective Cyber Defense?
The SOC visibility triad encompasses three fundamental components that form the backbone of an effective security monitoring and incident response capability: SIEM: Logs provide a comprehensive record of activities within your organization’s network and systems. Through thorough correlation rules that Neurosoft develops daily the team is in place to detect and investigate advanced threats. NDR: […]
Neurosoft is a sponsor of the (ISC)² Hellenic Chapter!
It is our great pleasure and honor to be one of the sponsors of the International Information System Security Certification Consortium, (ISC)² Hellenic Chapter. The (ISC)² Hellenic Chapter is the world’s largest organization of certified information security professionals (founded in 1989 and with more than 150,000 members worldwide) and includes members composed of information security […]
SD-WAN: The great ally of ZeroTrust
End-to-end network visibility plays a key role in enabling Zero Trust. Neurosoft’s Enterprise Link provides businesses with a comprehensive SD-WAN solution that optimizes their security and operations. To improve security postures across highly distributed environments, organizations are launching zero trust initiatives. By providing fine-grained visibility into application, user, and device traffic on the network, having […]
FortiSASE: Extend your protection anywhere!
Fortinet’s FortiSASE provides the best cloud security to remote users. Neurosoft as an Expert Level Fortinet Partner offers a group of proven solution experts who can deliver the full range of Fortinet solutions & manage complex deployments. With FortiSASE you win: Higher Security Better User Experience Lower cost Driven by more than 20 years of […]
Webinar: A Walkthrough to Security Awareness
Neurosoft, in partnership with KnowBe4, hosted a very successful webinar on Wednesday, June 7, about the benefits of security awareness and its importance for the security of companies and organizations. Participants were welcomed by Andreas Dakas, Cyber Security Architect at Neurosoft. Then, Jelle Wieringa, Security Awareness Advocate from KnowBe4, analyzed social engineering methods and their […]