Security solutions

 

Firewalls and antivirus systems

Požarni zidovi, antivirusne rešitve in varovanje podatkov ter arhiviranje

A good firewall protects any kind of intrusion or unauthorized entry into your network and helps to simultaneously detect intruders and inform you about it!

Network security, security of your data and a smooth network traffic are now increasingly important aspects of business. Our experts will protect your computer system from malware attacks, with the appropriate software and hardware. We use firewalls Microsoft ISA (Internet Security and Acceleration Server 2004, 2006), Microsoft TMG (Forefront Threat Management Gateway), and antivirus protection software NOD32, Symantec and Sophos.

 

Data protection and backup

Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups popularly represent a simple form of disaster recovery, and should be part of a disaster recovery plan, by themselves, backups should not alone be considered disaster recovery. Not all backup systems or backup applications are able to reconstitute a computer system, or in turn other complex configurations such as a computer cluster, active directory servers, or a database server, by restoring only data from a backup.

Antivirusne rešitve in varnost podatkov

Since a backup system contains at least one copy of all data worth saving, the data storage requirements are considerable. Organizing this storage space and managing the backup process is a complicated undertaking. A data repository model can be used to provide structure to the storage. In the modern era of computing there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.

Before data is sent to its storage location, it is selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Many organizations and individuals try to have confidence that the process is working as expected. It is also important to recognize the limitations and human factors involved in any backup scheme.