Services
Business Software Packages
Time and Attendance System (TAN)
Network Integration
VoIP telephony
Video Surveillance and Alarm Systems
Cyber Security
Fiscalization Services
Service Center
Solutions
Network Solution
Wi-Fi Solution
VoIP Solution
TAN Solution
Video Surveillance Solution
Smart Home Solution
Cyber Security Solution
Products
About us
Our story
Meet the Team
Mission and Vision
Reference List
Certifications
King Partner Days
Contact
Headquarters
PC Center 1 – Doboj
PC Center 2 – Modriča
PC Center 3 – Doboj
SR
|
EN
SR
|
EN
Services
Business Software Packages
Time and Attendance System (TAN)
Network Integration
VoIP telephony
Video Surveillance and Alarm Systems
Cyber Security
Fiscalization Services
Service Center
Solutions
Network Solution
Wi-Fi Solution
VoIP Solution
TAN Solution
Video Surveillance Solution
Smart Home Solution
Cyber Security Solution
Products
About us
Our story
Meet the Team
Mission and Vision
Reference List
Certifications
King Partner Days
Contact
Headquarters
PC Center 1 – Doboj
PC Center 2 – Modriča
PC Center 3 – Doboj
Početna
Solutions
Cyber Security Solution
Cyber Security Solution
Status Description
Virus infection of computers by email
Data encryption without user being aware of
Data loss and business problem
The user tried unsuccessfully to decrypt the data
A network of over 70 computers with various types of both Windows operating systems and anti-virus software
The existence of several workgroups
Client’s Conditions
Have cyber protection on all computers used in business
To install unique anti-virus protection
Re-arrange the computer network and segment the network
Setting unique passwords and accesses
Used equipment
Draytek Vigor 2960
Kaspersky Security Center
Windows Server 2012
Practical Solution
Draytek Vigor 2960 device configuration
Installation of Kaspersky Security Center 10 and removal of existing anti-virus software
Setting up Windows domains to Windows Server 2012
Complete arrangement and establishment of network supervision
Network segmentation
Setting up a web filter
Unique policy (USB, password)
Create Tasks (QuickScan)
Regular cyber security reports
CHECK OUR REFERENCES.
OVER 23 YEARS ON THE MARKET.
ONE STEP AHEAD OF OTHERS.
REFERENCE LIST