Vip Security solutions

Protect complete network and data

Stormshield firewall

Stormshield UTM Firewall - complete network, computer and data protection.

Stormshield provides:

  • Application control
    Social network and unauthorized applications must be controlled in your business network.
  • User authentication
    Instead of IP addresses and port numbers, check which application is active, and specify webpage you can access.
  • Bandwidth management
    In order to provide quality services, a certain bandwidth must be provided for servers and telephony. Set up network so priority traffic should always have certain throughput.
  • Antivirus and antispam protection
    Embedded antispam and antivirus protect your mail, network and users.

F-secure antivirus protection

F-secure provides:

  • Cloud protection
  • On-site business security
  • Powerful central security management tool that provides superior control and manageability for demanding environments
  • Integrated solutions Connection control, Browsing Protection, Web Content Control
  • Advanced functionality such as system updates and patch management for 3rd party products

Vectra Cognito network protection

Vectra Cognito analyzes complete events within the network and virtual environment and provides complete picture of the operation of all devices on the network.

Vectra Cognito provides:

  • With the help of artificial intelligence and constant learning algorithms, Vectra quickly and efficiently finds new attacks within the network before irreparable damage occurs
  • By automating cyber attacker detection, Vectra AI condenses days or weeks of work into minutes
  • Detects hidden and unknown attacks in real time, whether traffic is encrypted or not

iStor Online Backup

iStor provides you complete solution for online data backup:

  • All data is stored on at least two locations, which are minimum 400 km away, on at least two servers
  • Unlimited number of clients
  • Encryption on the data source
  • Data deduplication
  • Save data from offsite offices
  • Trace data handling
  • Central management
  • Licensing based on used capacity

For more information about Security solutions: