top of page

INFORMATIC SECURITY

Along with the growth and mass adoption of the internet have come new and varied threats to your business. Scammers, hackers, and identity thieves are trying to steal your personal information – and your money. Even internal resources themselves can pose a threat to your organization if they have indiscriminate access to other areas.


To help you face these new threats, the Uptel Engineering team carries out a process that consists of identifying the risks, threats, vulnerabilities and security requirements to which your organization is exposed, to decide what measures should be used to reduce these risks. to an acceptable level, based on the value of the information resources to the organization.

2.jpg

The levels at which we can carry out this process are:

3.jpg

PERIMETER SECURITY

It is based on the establishment of security resources at the perimeter of the network, allowing the definition of trust levels, the access of internal or external users to certain services, and denying any type of access to others.


The solutions that cover this level of security are: Firewall, UTM, Web Filtering, AntiSPAM, Perimeter Antivirus, VPN, DMZ, etc.

4.jpg

LAN SECURITY

The implementation of virtual LAN networks offering independence by groups as if they were isolated networks, guaranteeing communication and sending of data on the network, provides privacy between departments, guaranteeing the confidentiality of information.


The solutions that cover this level of security are: Switchcore, Vlans, Active Directory, ACL, etc.

5.jpg

ENDPOINT SECURITY

Today's computer users, be they home, business, educational, or government, face a landscape of stealth threats, with specific objectives and economic motivations, that take advantage of vulnerabilities in the devices of workstations, servers and mobile devices.


The solutions that cover this level of security are: Antivirus, Antimalware, Vulnerability Manager, Active Directory, etc.

bottom of page