802.11ax 6 th generation WiFi
802.11ax called the 6 th inspection as a method generation WiFi is of increasing IT another version of the security in a company. wireless network The system of work standard It was station protection is one designed in a way that of the IT system it can effortlessly serve elements in the context a bigger number of of security again devices through one unauthorized access. In access point at higher the age of imnipresent speeds. The standard and sophisticated uses the techniques threats and considering provided by its the low awareness of predecessors such as the IT system users 802.11ac or n.Read more about the 802.11ax 6 generation WiFi.
The DNS protocol inspection as a method of increasing IT security in a company. The system of work station protection is one of the IT system elements in the context of security again unauthorized access. In the age of omnipresent and sophisticated threats and considering the low awareness of the IT system users preventing dangers only thanks to antivirus software can be insufficient.More about CISCO Umbrella
Should I migrate the servers to the cloud?
The calculation cloud is a fashionable IT service development direction. World's biggest players like Microsoft or Amazon invest huge amount of money into the development and promotion of technology enabling the IT company environment virtualization.Read more about migrate the servers to the cloud
Every business should have data collection space. Depending on the conception, whether a company uses cloud solutions or opts for using its own IT infrastructure, it should choose disk array or a set of data collection arrays.Read more about disk arrays
vSAN double-node cluster
vSAN is the WMWare solution used for the hyper-convergence infrastructure deployment. The platform contains the elements enabling the calculation, net, and data carrier layer software definition.More about vSAN service
Providing security for a local workstation and computer network users poses one of the more important tasks for the computer system administrator. A well-designed IT security policy in a company should take a range of aspects into account and its preparation should be based on the IT audit.Read more about workstation security provision.
CISCO ESA - spam and antivirus e-mail filter
E-mail servers do not include any security measure against spam or malicious software. Irregardless of using free open-source Linux-based e-mail solutions or commercial systems such as Microsoft Exchange we need an external content control system in order to verify messages in terms of spam or viruses.More about CISCO ESA spam and
Azure Site Recovery and Azure Backup - company data protection
Microsoft Azure cloud services provide devices for keeping the work continuity and post-failure data recovery. Preserving work continuity is of crucial importance for business applications. A lack of access to the key business applications is often connected with company work stoppage and high financial loses.More about Azure Site
Microsoft Exchange Online - e-mail Azure cloud server
Microsoft Exchange Online is a business class e-mail and calendar service dedicated to companies and served on the Azure cloud. Businesses using the Azure cloud do not have to invest in their own servers as the whole infrastructure needed for a safe Internet data exchange through e-mail is served by Microsoft.Read more about e-mail Azure cloud server
Data archiving tools
Strategy, tool, and IT data archiving tool techniques description. Company data saved on the servers and disk arrays are one of the most valuable assets a company possesses and that is why it should be properly secured against random incidents or intentional activity.More about data archiving tools
VPN - safe company branch connection
The description of VPN technology for the execution of safe company branch connection and providing safe communication for remote working. A safe IT infrastructure is one of the key aspects for every company. It should be provided on every level of IT structure including the computer networks.More about VPN tunnels
Routing protocols - data exchange between company branches
Using the routing protocols (RIP, OSPF, EIGRP) to determine the cross-branch traffic exchange policy. Information exchange in computer networks between distant subnetworks, i.e. company branches requires proper IP package routing configuration. Routing can be configured manually on the edge devices or one of the available routing protocols can be deployed.More about cross-branch data exchange
Linux e-mail server
A free Linux software is perfect for starting the e-mail system. Packages included in the software are an application bundle that will meet all the customer's needs while simultaneously being free of software licensing.Read more about Linux e-mail.
Linux and Windows server administration
Service migrating to the calculation clouds is a noticeable tendency on the IT market, however, from a technical point of view, calculation clouds of company servers require an adequate approach as for the Linux or Windows server administration.Linux and Windows server administration.
WLAN wireless network controller
The features and functionality of a manageable WiFi wireless network. A stable wireless network is especially important for the industrial solutions and a means to an end can be the deployment of a WiFi network controller.More about the wireless network controller.
Local computer network segmentation
VLAN virtual local networks enable a physical division of a computer network into isolated logical segments. A physical computer network can be divided into logical segments in which the flow will be separated and possible only inside a certain segment.More about the local computer network.