Saturday 22 August 2020

Once again on obese security: concise and clear

The security and safety of customer data is one of the key components of Tucha's business. In order to ensure maximum protection of information, we use both hardware and software.

Ensuring the protection and safety of client information: edge programmer tech support

the use of cluster solutions (data is stored not on one server, but in clusters);

daily data backup (if necessary, the client company can adjust the frequency and volume of backup);

use of server solutions from HP (no less than ProLiant DL180 G6) and Dell (no less than PowerEdge R510); data storages consist of Hitachi SAS disks (Ultrastar 15K600 or higher), combined into RAID10 arrays;

isolation of client companies' data from each other (each of them receives separate dedicated virtual machines and virtual networks);

monitoring of network activity.

Additional features:

use of VPN connections using encryption protocols (Tucha supports IPSEC, PPTP, L2TP);

two-level user authentication in Tucha (in addition tokens and smart cards can be used for the authorization process);

the ability to effectively and at a lower cost organize control over the movement of information within the organization (access policies, logging of data downloads, restrictions on the use of USB ports, etc.), as a result of which the risk of moving commercial information out of the office is minimized.

For most small and medium-sized companies, providing such a high level of security in a classic IT infrastructure is absolutely impossible due to the lack of the necessary tools and IT specialists of the appropriate level. And we offer all this in a standard set of services.

No comments:

Post a Comment

What You Can Model with the Heat Transfer Module

Conduction, Convection, and Radiation Analyses The Heat Transfer Module can be used to study the three types of heat transfer in detail, exp...