IT security

In all projects, we make sure that they are sufficiently secure. The main pillars include:

  • UTM Firewalls with IPS, IDS and protocol control
  • Multi-factor authentication for services accessed from the Internet
  • Proper MS AD setup
  • Limiting permissions to only what the user really needs
  • Backup to a separate location
  • Recovery plans (what if something doesn't work)
  • Continuous monitoring of functionality

WHEN INVENTING IT SOLUTIONS WE ALWAYS PAY ATTENTION TO THEIR SAFETY