contact

  • Networks Equipments (switchs, routers)  Vente
  • IP Telephony and accessories (telephones, headspeakers...)
  • Securities Equipments (Firewall, Security Appliance)
  • Mobility equipment (AP wifi)
  • Servers et Desktop and Laptops  (Dell, HP, Toshiba ...)

Security solutions:

Installation and configuration of cisco ASAS FirewallRouteur

  • VPN IPSEC
  • VPN SSL

Installation and configuration of UTM (Unified Threat Management)

  • SA500 range
  • Firewall Asa with CSC-SSM module inside (Content Security - Control Security Service Module)

Installation and configuration of virus & spam blocker appliance

  • Cisco Spam & Virus Blocker supplies a complete protection against the spam, and other threats conveyed by the messaging system

Installation and configuration of Kaspersky antivirus

  • Proactive protection
  • Realtime analyse of internet flows
  • Protection of files system

Network equipments deployment :

  • Switchs and routers installation and configuration

    Main-res
  • Wireless Network Installation andconfiguration

Maintenance préventive :

  • Mise à jour des versions des systèmes d'exploitation adaptées aux équipements réseaux

Preventive maintenance :

  • Operating systems Update adapted to network equipments
  • Standard exchange of network equipment according to the maintenance contract
  • Repair network equipments
  • Hotline
  • Imposed 7/7 in not manufactured hours

Prerequisites:

  •  Materials: 1 PC per person, a server machineLandesk
  •  Software: Operating system Windows Server 2003 or 2008, vmware, framework latest version, IIS version 6 or later

Days of Training: 5 days training
PURPOSE: CENTRALIZE COMPUTER PARK MANAGEMENT

INVENTORY:

  •  Motor inventory based on different standards: SMBIOS, DMI, WMI and APIs "Plug & Play"
  •  Programming inventories or demand.
  •  Put together information on:

♣ The equipment (motherboard, network card, disk, ...)
♣ The system (BIOS, OS, environment variable, ...)
♣ The installed devices (mice, keyboards, screen, ...)
♣ The network (MAC address, IP, Domain / Workgroup, ...)
♣ The software installed

  •  Ability to provide feedback Custom (forms)

 


SOFTWARE DISTRIBUTION

  •  Benefits LANDesk

♣ Multiple distribution method (push, pull, at the request ...)
♣ Managing and Using Intelligent Network:
Peer download,
Targeted Multicast,
Dynamic bandwidth management,
Go on delivery failure
♣ Management of different geographic locations and via mobile download servers Preferred - No specific infrastructure!

  •  Manage interactions with users (silent timing, early warning of distribution, customized message in case of problems, success message, user portal)

REMOTE CONTROL FOR ASSISTANCE:

  •  Various connection modes:

♣ Decision-hand
♣ Discussion
♣ File Exchange
♣ View Only
♣ Drawing (teaching method)
♣ Remote Command Execution

  •  Different security mode
  •  Manage user permissions
  •  Managing Network Connections
  •  Logs

MASS DEPLOYMENT OF OPERATING SYSTEMS AND MIGRATION PATTERNS OF USERS:

  •  Includes a tool for imaging system

♣ ImageW and ImageW.v2

  •  Supports other tools of imaging market system:

♣ Symantec Ghost, Microsoft ImageX, ...

  •  Supports pre-boot environments:

♣ Win PE, PE DOS, Lunix and OSX PE PE

  •  Includes a tool for capturing user profile: system and applications.

MONITORING OF LICENSE APPLICATIONS

  •  Detection of applications on machines
  •  Define customizable application
  •  Monitoring the use of applications in machine
  •  Control software license compliance

MANAGEMENT OF SAFETY PATCH MANAGER IS A UNIT OF:

  •  Analysis of vulnerabilities and update
  •  Vulnerabilities systems: Microsoft Windows - Mac OS - Linux - ...
  •  Vulnerabilities software: Microsoft, Adobe, Mozilla, Java, Flash
  •  Custom definitions custom
  •  Collection and dissemination of patches
  •  Centralized patch
  •  Dissemination programmed, selective, automatic
  •  reporting and alerting.
  •  Generating reports
  •  Archiving
  •  Overview of the state park / accurate view of a machine
  •  Workflow - Workflow

♣ Download / update the definitions of vulnerability
♣ Configuring managed devices for analysis
♣ Reading and Organizing Information
♣ Creating and configuring security policies and analysis tasks
♣ Analysis of the results of scan
♣ Download patches for vulnerabilities found
♣ Deployment and installation of patches on vulnerable positions
♣ Checking the installation state and the history of corrections


BLOCKING APPLICATIONS

  •  Detection

♣ List of predefined application block provided by LANDesk
♣ Personal applications can be added to this list

  •  Refusal to comply

♣ Blocking unwanted applications by the administrator or not corresponding to standards (blacklist)
♣ Allows to raise the level of security
♣ Blocking the signing of the application and not on behalf

ANTI-VIRUS

  •  Detecting rootkits
  •  Right-click in Windows Explorer
  •  Temporarily disable the antivirus
  •  Mini scan memory
  •  Pause possible analysis
  •  Detection and elimination of hazards ("database extension")
  •  Content Engine Kaspersky
  •  Quarantine malicious files (on server)
  •  Updated definition files (deployment definitions "pilot")
  •  driver gradual deployment of updates
  •  Analysis of the Outlook email
  •  Reporting / Alerts / Scoreboard

HIPS (HOST INTRUSION PREVENTION-BASED SOLUTIONS)
Purpose: Checks and automatically restricts the behavior of certain applications so that any malicious code cannot compromise the safety or stability of the system

  •  Multiple levels of protection

♣ Protection against abnormal behavior
♣ Filtering attachments to emails and downloads
♣ Protection of vital files against changes
♣ Protection against changes in the system boot the machine
♣ Certification life applications using the MD5 algorithm from RSA Data Security
♣ Blocking execution of applications from removable drives

  •  Security based on a principle of White List

♣ Contains the list of authorized applications
♣ Allows to refuse any application

  •  Protection against Buffer Overflow
  •  Benefits

♣ Active protection when no patch is available to counter attack
♣ Protection against zero-day attacks
♣ Overall LANDesk Management Console
♣ Integration of security policies HIPS with the strategies of other modules (integrating in the same agent LANDesk)
♣ Reporting module integrated in the same administrative console
♣ Provides control over what applications can be executed on a workstation
♣ Detects and removes rootkits and hidden processes
♣ Detects and warned of problems with services, the startup process and ActiveX controls
♣ Used to prevent accidental starting or stopping processes
♣ Protection of system files and registry

web design Specialist , we invite you to control your Internet project. We carry with you a clear specifications , we develop a graphic web and we provide quality technical integration..webrose

We begin all projects of website creation by a key exchange with you ( by appointment at our offices or by telephone.

This interview is used to define an initial specification to:

  • define the objectives of the site, the results to be obtained through this website
  • determine or targets ( the general public , businesses , industry, etc.)
  • define which site content : text, images, photos, videos, etc.
  • provide the functionality (eg, a blog, photo albums, a booking module , etc.)
  • rational choices for the realization of the graphic ..

This specification will be a necessary support for smart development , it will also provide you with a quotation for carrying out your website.