{"id":6614,"date":"2023-10-03T14:21:13","date_gmt":"2023-10-03T12:21:13","guid":{"rendered":"https:\/\/www.faster.cz\/produkt\/ochrana-site-a-provozu\/"},"modified":"2024-08-16T10:36:11","modified_gmt":"2024-08-16T08:36:11","slug":"protection-of-network-and-traffic","status":"publish","type":"produkt","link":"https:\/\/www.faster.cz\/en\/product\/protection-of-network-and-traffic\/","title":{"rendered":"Protection of Network and Traffic"},"content":{"rendered":"\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-btn-submenu\"><a class=\"wp-block-button__link wp-element-button\" href=\"#firewall\">Firewall | VPN | SD-WAN<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-btn-submenu\"><a class=\"wp-block-button__link wp-element-button\" href=\"#ha-cluster\">HA cluster<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-btn-submenu\"><a class=\"wp-block-button__link wp-element-button\" href=\"#off-line-backup\">Offline backup<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-btn-submenu\"><a class=\"wp-block-button__link wp-element-button\" href=\"#anti-ddos\">Anti DDoS<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-btn-submenu\"><a class=\"wp-block-button__link wp-element-button\" href=\"#waf\">Advanced WAF | Web Application Firewall<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"firewall\">Firewall | VPN | SD-WAN<\/h2>\n\n\n\n<p>We manage threats and vulnerabilities to network resources and critical decentralized IT ecosystems in a VPN environment.<\/p>\n\n\n\n<p>We provide service connectivity using SD-WAN, in-depth network analysis, off-line backups out of reach of attackers and Anti DDoS protection.<\/p>\n\n\n\n<p><strong>Service detail<\/strong><\/p>\n\n\n\n<ul class=\"is-style-list-square wp-block-list\">\n<li>User access control<\/li>\n\n\n\n<li>Implementation of multi-factor authentication<\/li>\n\n\n\n<li>Vulnerability management of IT\/OT and IoT devices<\/li>\n\n\n\n<li>Cloud access management<\/li>\n\n\n\n<li>Consulting service for licensing and implementation of software protection systems<\/li>\n\n\n\n<li>Risk Management Module<\/li>\n\n\n\n<li>SD-WAN: automatic monitoring of network traffic, route selection with the highest possible quality guarantee combined with high security requirements<\/li>\n\n\n\n<li>Open source technology with non-vendor locking principle for integration of different technologies and optimization of network connection costs<\/li>\n\n\n\n<li>In-house development of a &#8220;secure by design&#8221; architecture for central management and monitoring of mission-critical applications<\/li>\n\n\n\n<li>Guaranteed direct access for complete technical and security oversight of 7\/24\/365 traffic without the involvement of applications, software and 3rd party support<\/li>\n\n\n\n<li>Next Generation Firewaliing<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ha-cluster\">HA cluster<\/h2>\n\n\n\n<p>We protect the critical systems of organizations (financial systems, production management, etc.) and provide continuous access through High Availability technologies to ensure high availability of servers, data and applications.<\/p>\n\n\n\n<p>We optimize and implement measures in case of failures, outages and serious damage to the key operations of small and medium-sized companies.<\/p>\n\n\n\n<p><strong>Service detail<\/strong><\/p>\n\n\n\n<ul class=\"is-style-list-square wp-block-list\">\n<li>Operation of our own data centre with high availability also at the data storage layer<\/li>\n\n\n\n<li>Ensuring the operation of critical information systems in a system of online replicable storage<\/li>\n\n\n\n<li>Configuring HA clusters with failover support for high availability<\/li>\n\n\n\n<li>Continuous monitoring of potential points of failure and data corruption: storage, power supplies, network components and other HW and SW resources<\/li>\n\n\n\n<li>Analysis of the environment for running critical enterprise applications, including development of DRPs\/ Plans for large-scale data corruption and recovery<\/li>\n\n\n\n<li>Utilization of proprietary automated data backup and offline backup systems<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"off-line-backup\">Offline Backup<\/h2>\n\n\n\n<p>We offer a service for storing backups out of the reach of attackers, which is operated in a separate and secure infrastructure in the event of an attack on the primary source of IT infrastructure.<\/p>\n\n\n\n<p>We use automated systems to back up servers, workstations and data storage of various types using proven backup technologies.<\/p>\n\n\n\n<p><strong>Service detail<\/strong><\/p>\n\n\n\n<ul class=\"is-style-list-square wp-block-list\">\n<li>Backup Analysis of objects for the backup segmentation system according to the sensitivity of corporate data and the methodology of the National Security Office of the Czech Republic<\/li>\n\n\n\n<li>Automatic sorting of critical data into a multi-level media structure with respect to the required recovery speed within the Recovery Time Objective and Recovery Point Objective \/DRP strategies<\/li>\n\n\n\n<li>Active protection against ransomware<\/li>\n\n\n\n<li>Design and implementation of encryption infrastructure for object and data backup<\/li>\n\n\n\n<li>Secure backup of data to object storage in the cloud within our data center meeting minimum Tier III requirements across multiple geographically separated locations<\/li>\n\n\n\n<li>Remote risk monitoring of backup devices<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"anti-ddos\">Anti DDoS<\/h2>\n\n\n\n<p>We design the strategy and implementation of the highest level of network security solutions against complex and sophisticated DDoS attacks.<\/p>\n\n\n\n<p>We monitor traffic and provide threat prevention with an automated real-time remediation service.<\/p>\n\n\n\n<p>We detect DDoS attacks early, ensure high connectivity availability at all times and block ongoing attacks.<\/p>\n\n\n\n<p><strong>Service detail<\/strong><\/p>\n\n\n\n<ul class=\"is-style-list-square wp-block-list\">\n<li>Unique HW assemblies for cleaning DDoS attacks within the Faster CZ backbone network<\/li>\n\n\n\n<li>External scrubbing center for high traffic volume attacks<\/li>\n\n\n\n<li>Providing access to network traffic, attack details and enhanced technical support 24\/7\/365<\/li>\n\n\n\n<li>Protection against attacks using known tools and specific attack techniques (ICMP\/IGMP\/UDP FLOOD, TCP ACK\/RST\/SYN incl. FIN and ACK FLOOD, TCP fragmentation, etc.)<\/li>\n\n\n\n<li>Monitoring of defined network objects with setting of rules for mitigation of different types of attacks<\/li>\n\n\n\n<li>Availability of the protected service is ensured even during an attack<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"waf\">Advanced WAF | Web Application Firewall<\/h2>\n\n\n\n<p>The service provides enterprise-grade web application security protection that is constantly adapting. Based on leading web application firewall certification, it provides full coverage of OWASP Top-10 threats and automatically adapts protection as threats evolve and assets are protected.<\/p>\n\n\n\n<p><strong>Service detail<\/strong><\/p>\n\n\n\n<ul class=\"is-style-list-square wp-block-list\">\n<li>Protecting web applications from various types of attacks such as SQL injection, cross-site scripting (XSS) or cross-site request forgery (CSRF)<\/li>\n\n\n\n<li>Filtering the content of HTTP requests and responses, eliminating dangerous elements using defined WAF rules<\/li>\n\n\n\n<li>Monitoring traffic and identifying unusual or suspicious behavior patterns that indicate a possible attack<\/li>\n\n\n\n<li>Preventing unauthorized access to applications and data by detecting and blocking suspicious activity<\/li>\n\n\n\n<li>Supporting the identification and containment of bots that may be involved in malicious activities such as botnet attacks<\/li>\n\n\n\n<li>Helping organizations comply with security standards and regulations by protecting web applications against potential security threats<\/li>\n<\/ul>\n","protected":false},"featured_media":0,"template":"","kat":[89],"class_list":["post-6614","produkt","type-produkt","status-publish","hentry","kat-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protection of Network and Traffic - Faster.cz<\/title>\n<meta name=\"description\" content=\"We will connect you via SD-WAN, analyze the network, provide off-line backups and Anti DDoS protection and ensure high availability of services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.faster.cz\/en\/product\/protection-of-network-and-traffic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protection of Network and Traffic - Faster.cz\" \/>\n<meta property=\"og:description\" content=\"We will connect you via SD-WAN, analyze the network, provide off-line backups and Anti DDoS protection and ensure high availability of services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.faster.cz\/en\/product\/protection-of-network-and-traffic\/\" \/>\n<meta property=\"og:site_name\" content=\"Faster.cz\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Fastercz\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-16T08:36:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Fastercz\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.faster.cz\\\/en\\\/product\\\/protection-of-network-and-traffic\\\/\",\"url\":\"https:\\\/\\\/www.faster.cz\\\/en\\\/product\\\/protection-of-network-and-traffic\\\/\",\"name\":\"Protection of Network and Traffic - Faster.cz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faster.cz\\\/#website\"},\"datePublished\":\"2023-10-03T12:21:13+00:00\",\"dateModified\":\"2024-08-16T08:36:11+00:00\",\"description\":\"We will connect you via SD-WAN, analyze the network, provide off-line backups and Anti DDoS protection and ensure high availability of services.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.faster.cz\\\/en\\\/product\\\/protection-of-network-and-traffic\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.faster.cz\\\/#website\",\"url\":\"https:\\\/\\\/www.faster.cz\\\/\",\"name\":\"Faster.cz\",\"description\":\"...\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.faster.cz\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protection of Network and Traffic - Faster.cz","description":"We will connect you via SD-WAN, analyze the network, provide off-line backups and Anti DDoS protection and ensure high availability of services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.faster.cz\/en\/product\/protection-of-network-and-traffic\/","og_locale":"en_US","og_type":"article","og_title":"Protection of Network and Traffic - Faster.cz","og_description":"We will connect you via SD-WAN, analyze the network, provide off-line backups and Anti DDoS protection and ensure high availability of services.","og_url":"https:\/\/www.faster.cz\/en\/product\/protection-of-network-and-traffic\/","og_site_name":"Faster.cz","article_publisher":"https:\/\/www.facebook.com\/Fastercz\/","article_modified_time":"2024-08-16T08:36:11+00:00","twitter_card":"summary_large_image","twitter_site":"@Fastercz","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.faster.cz\/en\/product\/protection-of-network-and-traffic\/","url":"https:\/\/www.faster.cz\/en\/product\/protection-of-network-and-traffic\/","name":"Protection of Network and Traffic - Faster.cz","isPartOf":{"@id":"https:\/\/www.faster.cz\/#website"},"datePublished":"2023-10-03T12:21:13+00:00","dateModified":"2024-08-16T08:36:11+00:00","description":"We will connect you via SD-WAN, analyze the network, provide off-line backups and Anti DDoS protection and ensure high availability of services.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.faster.cz\/en\/product\/protection-of-network-and-traffic\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.faster.cz\/#website","url":"https:\/\/www.faster.cz\/","name":"Faster.cz","description":"...","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.faster.cz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/produkt\/6614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/produkt"}],"about":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/types\/produkt"}],"wp:attachment":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/media?parent=6614"}],"wp:term":[{"taxonomy":"kat","embeddable":true,"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/kat?post=6614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}