info@cybershelter.com
+971 50 114 6930
  • HOME
  • ABOUT US
    • Locations
    • Careers
  • SERVICES
    • Security Assessment
      • Network Performance & Security Assessment

      • Product Assessment

      • Vulnerability Assessment & Penetration Testing

      • Configuration Review

      • SDLC Assessment

      • Application Code Reviews

      • Architecture Review

      • Mobile Hacking/Testing

      • Big Data Security Analysis

      • Detailed Web Assessment

    • Other Services
      • Implementation Services

      • Information Security Legal & Documentation

      • Security Advisory Services

      • SCADA security

      • Support Services

    • Consulting and Audit
      • Technical and Strategic Consultancy

    • Incident Response
      • Security breach investigation

      • Dynamic Cyber Security

    • IoT Security
      • IoT Security Services

    • Compliance
      • ISO 27001:2013

      • PCI DSS

      • HIPAA

      • COBIT

      • ISO 20000

      • ISO 22301

      • ITIL

    • Operational Security
      • Onsite Resources

      • CISO Services

      • Resident Engineer Services

      • Training and Certification

      • Online Brand Protection

      • Cyber & Information Security of Executives

    • Security Management
      • Cyber Attack Mitigation

      • Advanced Vulnerability Management

      • Data Life Cycle Security Management

      • Vendor Risk Management

    • Cloud Security
      • Cloud Security

  • SOLUTIONS
    • Web Security
      • Web Application Firewall

      • Antivirus and Antimalware Software

      • Proxy and Reverse Proxy Solutions

    • Identity
      • Two Factor Authentication (2FA)

      • Privileged Access Management System

    • Consulting
      • Change Auditor

      • File System Auditing

      • Policy Compliance Verification

      • Security Code Review

      • GRC Solution

    • Network Security
      • Content Filtering

      • DDoS Protection

      • APT Protection

      • DNS Protection

    • Mobile & Cloud
      • Cloud Security Product

      • Mobile Security and Device Management

    • Database Protection
      • Data Room

      • Data Classification and Discovery Solution

      • Database Security Solution

    • Proactive Defense
      • Intrusion Prevention

      • Data Leakage Prevention

      • Vulnerability Scanning

      • Penetration Testing

      • Risk Assessment

    • Incident Management
      • SIEM & Centralized Logging

      • Security Awareness Training

      • Digital Forensic Solution

    • Endpoint Security
      • End-to-End Encryption

      • File Integrity Monitoring (FIM)

  • LEGALITIES
    • Terms & Conditions
    • Privacy Policy
    • Copyright Notice
    • Disclaimer
  • BLOG
  • CONTACT US
  • HOME
  • ABOUT US
    • Team
      • Leadership
      • Board Members
      • Operational Management
      • Technical Team
    • News & Events
      • Media Coverage
      • Press Release
      • Events
    • Partners
    • Corporate
      • Awards and Achievements
      • Company Profile
    • Locations
    • Careers
    • More
  • SERVICES
    • Security Assessment
      • Network Performance and Security Assessment
      • Product Assessment
      • Vulnerability Assessment and Penetration Testing
      • Detailed Web Assessment
      • SDLC Assessment
      • Application Code Reviews
      • Architecture Review
      • Configuration Review
      • Mobile Hacking/Testing
      • Big Data Security Analysis
    • IoT Security Services
    • Cloud Security Services
    • Compliance
      • ISO 27001:2013
      • PCI DSS
      • HIPAA
      • COBIT
      • ISO 20000
      • ITIL
      • ISO 22301
    • Consulting & Auditing
      • Technical and Strategic Consultancy
    • Operational Security
      • Onsite Resources
      • CISO Services
      • Residential Engineer Services
      • Training and Certification
      • Online Brand Protection
      • Cyber and Information Security of Executives
    • Security Management Services
      • Cyber Attack Mitigation Services
      • Vendor Risk Management
      • Data Life Cycle Security Management
      • Advanced Vulnerability Management
    • Incident Response Services
      • Security breach investigation services
      • Dynamic Cyber Security
    • Other Services
      • Implementation Services
      • Information Security Legal and Documentation Services
      • Security Advisory Services
      • SCADA security
      • Support Services
    • All Services
  • RESOURCES
    • Research
      • Case Study
      • White Paper
      • Team Contributions
    • Insight
      • Web Casts
      • Conferences
      • Seminars
      • Advisories
    • Blog
    • Client Recommendations
    • All Resources
  • LEGALITIES
    • Terms & Conditions
    • Privacy Policy
    • Copyright Notice
    • Disclaimer
    • All Legalities
  • SOLUTIONS
    • Web Security
      • Web Application Firewall
      • Antivirus and Antimalware Software
      • Proxy and Reverse Proxy Solutions
    • Network Security
      • Content Filtering
      • DDoS Protection
      • APT Protection
      • DNS Protection
    • Proactive Defense
      • Intrusion Prevention
      • Data Loss Prevention
      • Vulnerability Scanning
      • Penetration Testing
      • Risk Assessment
    • Identity
      • Two Factor Authentication (2FA)
      • Privileged Access Management System
    • Mobile & Cloud
      • Cloud Security Product
      • Mobile Security and Device Management
    • Incident Management
      • SIEM & Centralized Logging
      • Security Awareness Training
      • Digital Forensic Solution
    • Consulting
      • Change Auditor
      • File System Auditing
      • Policy Compliance Verification
      • Security Code Review
      • GRC Solution
    • Database Protection
      • Data Room
      • Data Classification and Discovery Solution
      • Database Security Solution
    • Endpoint Security
      • File Integrity Monitoring (FIM)
      • End-to-End Encryption
    • All Solutions

  • Home   
  • Privacy Policy

Privacy Policy

We know that you care about how your personal information is used and shared, and we take your privacy very seriously. By visiting the CyberShelter website, you are accepting the practices outlined in this policy.

This Privacy Policy covers CyberShelter’s treatment of personal information that CyberShelter gathers when you are on the CyberShelter website and when you use our services. This policy does not apply to the practices of third parties that CyberShelter does not own or control, or to individuals that CyberShelter does not employ or manage.


Information Collected by CyberShelter

We only collect personal information that is relevant to the purpose of our website. This information allows us to provide you with a customized and efficient experience. We collect the following types of information from our CyberShelter users:


Information You Provide to Us

We receive and store any information you enter on our website or provide to us in any other way. You can choose not to provide us with certain information, but then you may not be able to take advantage of many of our special features.


Automatic Information

We receive and store certain types of information whenever you interact with us. CyberShelter and its authorized agents automatically receive and record certain "traffic data" on their server logs from your browser including your IP address, CyberShelter cookie information, and the page you requested. CyberShelter uses this traffic data to help diagnose problems with its servers, analyze trends and administer the website.


Sharing Your Information

You can be rest assured that CyberShelter neither rents nor sells your personal information to anyone and that we will share your personal information only as described below.

  • CyberShelter Personnel: CyberShelter personnel and authorized consultants and/or contractors may have access to user information if necessary in the normal course of CyberShelter business.
  • Business Transfers: In some cases, we may choose to buy or sell assets. In these types of transactions, user information is typically one of the business assets that is transferred. Moreover, if CyberShelter, or substantially all of its assets, were acquired, user information would be one of the assets that is transferred.
  • Protection of CyberShelter and Others: We may release personal information when we believe in good faith that release is necessary to comply with a law; to enforce or apply our Terms of Use and other policies; or to protect the rights, property, or safety of CyberShelter, our employees, our users, or others. This includes exchanging information with other companies and organizations for fraud protection and credit risk reduction.
  • With Your Consent: Except as noted above, we will contact you when your personal information is shared with third parties or used for a purpose incompatible with the purpose(s) for which it was originally collected, and you will be able to opt out to prevent the sharing of this information.

LEGALITIES

  • Terms & Conditions
  • Disclaimer
  • Copyright Notice

Follow Newsletter

Solutions

  •  AntiVirus and AntiMalware
  •  Web Application Firewall
  •  DDoS Protection
  •  SIEM & Centralized Logging
  •  Database Security

Services

  •  Cloud Security
  •  CISO
  •  Cyber Attack Mitigation
  •  Security Breach Investigation
  •  Consulting and Audit

Resources

  •  Research
  •  Insight
  •  Blog
  •  Client Recommendations

Legalities

  •  Terms & Conditions
  •  Privacy Policy
  •  Copyright Notice
  •  Disclaimer

© cybershelter