System information network infrastructure is built with the purpose of providing these services to access the object. The end-user will use protocols such as FTP, HTTP, Telnet ... etc.. to make access to the database of interest.However, besides accessing is legitimate and does not appear at the illegal access to many different purposes.
Some criteria for the protection of network information and data: - Protection of the safety data contain important information from attack and unauthorized access.
- Online Protection and Core applications against Internet attacks from outside and inside the network. Preventing denial of service attack, attack increases system downtime.
- Ensure security when data is transmitted from the office or mobile worker to Head Office. Requirements to use VPN to connect remotely to Head Office.
- Prevent the risk of virus infection.
- Mechanisms must be strong user authentication in online applications when deployed on a wide range of services Internet environment.
- Develop policies for implementing information security system in accordance with the operational model of organizations and enterprises.
Technical Solutions
Model protect the overall network includes:
- Integrated firewall intrusion prevention and anti-virus protection class 1st place at the Head Office Gateway. This system protects the entire network including DMZ, Database Server, Application Servers, LAN.
- Intrusion prevention system integrated firewall and virus blocking the 2nd layer of protection to the database servers and critical applications.
- System management and centralized anti-virus protection for mail system and the Server, PC across the network.
Join our MailList system, you will receive the latest information on products, services and solutions, news, promotion and recruitment of companies Hop Thanh Thinh via email.