SECURITY MANAGEMENT

Our systems of data protection are used to eliminate critical threats to company operations as a result of a hacker attack.

We guarantee that systems of our customers remain operational with minimal impact on potential damage (loss and corruption of data, disruption of operations, threat to reputation, financial losses).

Firewall | VPN | SD-WAN

We manage threats and vulnerabilities to network resources and critical decentralized IT ecosystems in a VPN environment.

We provide service connectivity through SD WAN, by using in-depth network analysis, offline backups beyond the reach of attackers and Anti DDoS protection.

Detail of the Service

  • User access management
  • Implementation of multi-factor authentication
  • Vulnerability management of IT/OT and IoT devices
  • Cloud access management
  • Consulting service for licensing and implementation of software protection systems
  • Risk Management Module
  • SD-WAN: automatic monitoring of network traffic, route selection with highest possible quality guarantee combined with high security requirements
  • Open source technology with non-vendor locking principle for integration of multiple technologies and optimization of network connection costs
  • Custom development of a “secure by design” architecture for central management and monitoring of mission-critical applications
  • Guaranteed direct access to provide complete technical and security monitoring of 7/24/365 traffic without involvement of applications, software and 3rd party support
  • Next Generation Firewalling

HA cluster

We protect critical systems of organizations (financial systems, production management, etc.) and guarantee continuous access through High Availability technologies ensuring high availability of servers, data and applications.

We optimize and implement measures in the event of malfunctions, outages and serious damage to key operations in small and medium-sized companies.

Detail of the Service

  • Operation of our own data centre with high availability also at the data storage level
  • Ensuring operation of critical information systems in a system of online replicable storage facilities
  • Configuring HA clusters with failover support for high availability
  • Continuous monitoring of potential points of failure and data corruption: storage facilities, power supplies, network components and other HW and SW resources
  • Analysis of the environment for running critical corporate applications, including development of DRPs/ Plans for large-scale data corruption and recovery
  • Utilization of our own automated data backup and offline backup systems

Offline Backup

We offer a service for storage of backups out of the reach of attackers, which is running in the event of an attack on the primary source of the IT infrastructure in a separate and secure environment.

For backup of servers, workstations and data storage of various types, we use automated systems with verified backup technologies.

Detail of the Service

  • Backup Analysis of objects for the backup segmentation system according to the sensitivity of corporate data and the National Security Office methodology
  • Automatic classification of critical data into a multi-level media structure with respect to the required recovery speed within the Recovery Time Objective and Recovery Point Objective /DRP strategies
  • Active protection against ransomware
  • Design and implementation of encryption infrastructure for object and data backup
  • Secure backup of data to object storage in the cloud within our data centre to meet at least Tier III requirements across multiple geographically separated locations
  • Remote risk monitoring of backup devices

Anti DDoS

We design the strategy and implementation of the highest level of network security against complex and sophisticated DDoS attacks.

We monitor traffic and ensure threat prevention with an automated real-time remediation service.

We identify DDoS attacks in a timely manner, ensure high connectivity availability at all times and block ongoing attacks.

Detail of the Service

  • Unique HW configurations for cleaning of DDoS attacks within the Faster CZ core network
  • External scrubbing centre during high traffic volume attacks
  • Access to network traffic, attack details and enhanced technical support 24/7/365
  • Protection against attacks using known tools and specific attack techniques (ICMP/IGMP/UDP FLOOD, TCP ACK/RST/SYN incl. FIN and ACK FLOOD, TCP fragmentation, etc.)
  • Monitoring of specified network objects with setting of rules for mitigation of different types of attacks
  • Availability of the protected service is ensured even during an attack

Please do not hesitate to contact our Sales department for consultations and orders

+420 533 433 333

	
	 
	

Projekt "Vybudování a provoz datového centra Faster CZ spol. s r.o.," (číslo CZ.01.4.04/0.0/0.0/15_011/0001405) je spolufinancován Evropskou unií v rámci Operačního programu Podnikání a inovace pro konkurenceschopnost (OP PIK). Na základě žádosti o podporu ze dne 30.7.2015 byl projekt uznán Ministerstvem financí jako způsobilý k poskytnutí dotace na výstavbu datového centra.

Zahájení projektu: 1.9.2015

Ukončení projektu: 31.12.2018

Realizace projektu: Jarní 1064/44g, Maloměřice, 614 00 Brno.

Cílem projektu je vybudování a provoz nového ekologicky šetrného datového centra, které zvýší konkurenceschopnost firmy a kvalitu poskytovaných služeb, vytvoří nová specializovaná pracovní místa a rozšíří spolupráci s brněnskými vysokými školami.

lin fb yt tw

Faster CZ spol. s r.o.
Jarní 1064/44g, 614 00 Brno
IČO: 60722266
DIČ: CZ60722266
Datová schránka: gyw5w8t
Číslo bank. účtu: 290204641/0300

Design by mevia.cz