Security | GOLINE
Goline Logo



  • Route RPKI validation April 1st, 2022
    RPKI is a security framework by which network owners can validate and secure the critical route updates or Border Gateway Protocol (BGP) announcements between public Internet networks. BGP is essentially the central nervous system of the Internet and one of its fundamental building blocks. The main function of BGP is to facilitate efficient routing between Autonomous Systems (AS), by building and maintaining the Internet routing table. The Internet routing table is effectively the navigation system of the Internet and without it, traffic would be unable to flow between its constituent networks. Unfortunately, routing equipment alone cannot distinguish between legitimate and malicious routing announcements,...
  • RIPE – Atlas Anchor February 17th, 2022
    We have become an even more integral part of the RIPE Atlas project by hosting an anchor, a device that allows for latency analysis of traffic between autonomous systems. Atlas anchors play an integral role in the RIPE Atlas network by acting both as enhanced RIPE Atlas probes with more measurement capacity, as well as regional measurement targets within the greater RIPE Atlas network. Anchors are able to perform many more measurements than a regular RIPE Atlas probe, and the large amount of data they collect is made available to everyone. In addition, anchors act as powerful targets that can...
  • MANRS June 20th, 2020
    GOLINE firmly believes in initiatives to protect networks, improve security and resilience of the global routing system. Therefore we decided to support the MANRS project and join as participants.Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Internet Society, that provides crucial fixes to reduce the most common routing threats. MANRS offers specific actions via four programs for Network Operators, Internet Exchange Points, CDN and Cloud Providers, and Equipment Vendors. Requirements for Participation Please read the full MANRS Actions document before applying. You can become a participant if you meet these requirements: You (or your company) support...

The security team constantly works towards protecting IT systems in terms of the availability, confidentiality and integrity of the assets.

IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers.

As a cyber security company, nothing is more important to us than the security of our customers’ data.
A breach of our customer information could cost us our entire business, and that’s why we go above and beyond to implement the latest cutting-edge security tools, as well as ensure robust processes and the fundamentals of information security management are in place.

The security team constantly works towards protecting IT systems in terms of the availability, confidentiality and integrity of the assets.

We constantly endeavour to identify the threats and vulnerabilities in the systems, whether they are from inside or outside the IT network. Our proven experience gained over the years makes GOLINE an industry leader.

Below are some examples of protection or reorganisation of the crucial areas which need to be secured in your company. The analysis and expertise regarding the areas to be protected is the result of years of practical experience in the field, alongside the world’s leading vendors of IT and computer security solutions.

  • Anti-spam, Firewall and Threat Emulation integrated systems for the emulation, in a virtual environment, of all e-mail attachments or downloads performed at your company
  • Protection against Zero-day threats such as malware or viruses
  • Regulation of the traffic towards the Internet by means of web filter and application control systems
  • Secure connections with your partners or remote locations by means of VPN IPSec technology
  • Anti-spam protection of your mailbox
  • IDS/IPS analysis to servers exposed to external systems

Would love your thoughts, please comment.x