{"id":25,"date":"2012-11-18T21:52:11","date_gmt":"2012-11-18T21:52:11","guid":{"rendered":"http:\/\/www.binarisoftware.com\/en\/?page_id=25"},"modified":"2013-07-16T16:50:17","modified_gmt":"2013-07-16T16:50:17","slug":"services","status":"publish","type":"page","link":"https:\/\/www.binarisoftware.com\/en\/services\/","title":{"rendered":"Services"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>CONSULTING<\/strong><strong>, TRAINING, AUDITING<\/strong> for areas of security and communications systems in the field of Information Technology are the keys for an efficient and constant evolution of the company\u2019s computer systems.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>AVAILABILITY<\/strong><strong> OF APPLICATIONS<\/strong> Installation and configuration of Microsoft server cluster that allow continuity of applications in case of failure or malfunction in one of the nodes.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>THREAT<\/strong><strong> CONTROL<\/strong> Management of corporate antivirus that allows the control only by the administrator, not by the user. Moreover it does not allow the user to deactivate or uninstall, update all global stations and generate reports automatically.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>DATA SECURITY <\/strong>Management security backup systems that ensure the recovery of data in case of disaster, checking the results, controlling media cycles and generating periodic reports.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>SYSTEM MANAGEMENT<\/strong> Checking the state of the servers, establishing a set points control, analyzing their evolution, detecting the possibility of future incidents and generating global periodic reports.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>PERIMETER SECURITY<\/strong> Installation and management of firewall after the Internet access, UTM device with access filter functionalities, virus filter, attack detection, web pages filter, control of programs such as P2P or IM. Secure remote access to the organization by allowing secure access through VPN for teleworkers and service providers.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>ISMS (Information security management system)<\/strong> Consultancy and definition of processes for managing access to data, ensuring confidentiality, integrity and availability while minimizing security risks. Consulting the &#8220;Plan-Do-Check-Act&#8221; (PDCA) &#8220;Plan, Do, Check and Act as part of the ISMS.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>MANAGEMENT IT PLAN<\/strong> Consultancy and project definition necessary to align information technology to current and future business objectives.<\/span><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-official sd-sharing\"><h3 class=\"sd-title\">Share it:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button\" href=\"https:\/\/www.binarisoftware.com\/en\/services\/\" target=\"_blank\" title=\"Click to print\" ><span>Print<\/span><\/a><\/li><li class=\"share-linkedin\"><div class=\"linkedin_button\"><script type=\"in\/share\" data-url=\"https:\/\/www.binarisoftware.com\/en\/services\/\" data-counter=\"right\"><\/script><\/div><\/li><li class=\"share-twitter\"><a href=\"https:\/\/twitter.com\/share\" class=\"twitter-share-button\" data-url=\"https:\/\/www.binarisoftware.com\/en\/services\/\" data-text=\"Services\"  >Tweet<\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>CONSULTING, TRAINING, AUDITING for areas of security and communications systems in the field of Information Technology are the keys for an efficient and constant evolution of the company\u2019s computer systems. AVAILABILITY OF APPLICATIONS Installation and configuration of Microsoft server cluster that allow continuity of applications in case of failure or malfunction in one of the [&hellip;]<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-official sd-sharing\"><h3 class=\"sd-title\">Share it:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button\" href=\"https:\/\/www.binarisoftware.com\/en\/services\/\" target=\"_blank\" title=\"Click to print\" ><span>Print<\/span><\/a><\/li><li class=\"share-linkedin\"><div class=\"linkedin_button\"><script type=\"in\/share\" data-url=\"https:\/\/www.binarisoftware.com\/en\/services\/\" data-counter=\"right\"><\/script><\/div><\/li><li class=\"share-twitter\"><a href=\"https:\/\/twitter.com\/share\" class=\"twitter-share-button\" data-url=\"https:\/\/www.binarisoftware.com\/en\/services\/\" data-text=\"Services\"  >Tweet<\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":15,"comment_status":"open","ping_status":"open","template":"","meta":{"jetpack_post_was_ever_published":false},"jetpack_likes_enabled":false,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P3KDye-p","_links":{"self":[{"href":"https:\/\/www.binarisoftware.com\/en\/wp-json\/wp\/v2\/pages\/25"}],"collection":[{"href":"https:\/\/www.binarisoftware.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.binarisoftware.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.binarisoftware.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.binarisoftware.com\/en\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":25,"href":"https:\/\/www.binarisoftware.com\/en\/wp-json\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":112,"href":"https:\/\/www.binarisoftware.com\/en\/wp-json\/wp\/v2\/pages\/25\/revisions\/112"}],"wp:attachment":[{"href":"https:\/\/www.binarisoftware.com\/en\/wp-json\/wp\/v2\/media?parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}