What is Cyber Security
- # Penetration test.
- # Configuring perimeter security infrastructure.
- # Daily check of logs and reports.
- # Supply, Installation & Implementation of UTM Devices, Antivirus, etc.
- # Serving Domain Services: Active Directory, DNS, DHCP, Web Proxy, Database, Firewall, File Server, etc..
Cyber Security: Furaco services
Disaster Recovery and Business Continuity are two interrelated terms to indicate the processes and solutions able to predict any problems and remedy the attacks or disastrous events ensuring a rapid recovery of work.
The objective of a Business Continuity strategy is to ensure the survival of all essential business functions during and / or after a disastrous event through a plan consisting of processes and procedures.
Within the Business Continuity plan concerning ICT activities, the Disaster Recovery document, of which it is part, specifies at a technical level:
# PRECAUTIONS to be taken to secure the data
# The activities to be done for the RECOVERY in case of attack or disastrous event
Within the Disaster Recovery plan, Furaco IT delivers the services through HW and SW resources and connectivity to a CED alternative to that / those of production and within a predefined time frame.
The aim is to make the interruptions in the provision of ICT services minimal or nil.
contact us for a taylormade solution
Intrusion prevention solutions are particularly important within IT security services.
The IT security system must be able to prevent the direct or indirect alteration of the information, both by unauthorized users and by accidental events; it must also prevent unauthorized access to data.
We offer solutions able to guarantee a reliable and protected environment, controllable with a detailed and accessible reporting with authorizations based on the single user or groups of users.