CONSULTING, TRAINING, AUDITING for areas of security and communications systems in the field of Information Technology are the keys for an efficient and constant evolution of the company’s computer systems.
AVAILABILITY OF APPLICATIONS Installation and configuration of Microsoft server cluster that allow continuity of applications in case of failure or malfunction in one of the nodes.
THREAT CONTROL Management of corporate antivirus that allows the control only by the administrator, not by the user. Moreover it does not allow the user to deactivate or uninstall, update all global stations and generate reports automatically.
DATA SECURITY Management security backup systems that ensure the recovery of data in case of disaster, checking the results, controlling media cycles and generating periodic reports.
SYSTEM MANAGEMENT Checking the state of the servers, establishing a set points control, analyzing their evolution, detecting the possibility of future incidents and generating global periodic reports.
PERIMETER SECURITY Installation and management of firewall after the Internet access, UTM device with access filter functionalities, virus filter, attack detection, web pages filter, control of programs such as P2P or IM. Secure remote access to the organization by allowing secure access through VPN for teleworkers and service providers.
ISMS (Information security management system) Consultancy and definition of processes for managing access to data, ensuring confidentiality, integrity and availability while minimizing security risks. Consulting the “Plan-Do-Check-Act” (PDCA) “Plan, Do, Check and Act as part of the ISMS.
MANAGEMENT IT PLAN Consultancy and project definition necessary to align information technology to current and future business objectives.