Gdata has all the necessary cloud-based solutions to help customers focus on their core business. Hardware optimization, minimizing the risk of data loss, easy management, and the lowest cost are what we can do for our customers.
For businesses that own data and resources that require protection, closely monitoring the usage of these data and resources is a top requirement.
When the information system is the place to store and process customer-related and business-related data with great value, through this data, financial resources are circulated in a strict order and rules. If these data and processes are interfered with improperly, there will certainly be incalculable disruption and damage to the business as well as the loss of reputation of that business.
By closely cooperating with organizations operating in the field of system security that are famous in the world, our company always ensures to provide customers with system security solutions at 06 levels (organization, law, operation, trade, finance and human) in compliance with ISO 27001: 2005 standards to ensure its 3 attributes: Confidentiality, Integrity and Availability.
Based on this standard, our company always provides system security solutions according to the level of each enterprise with the minimum components such as:
MULTI-LEVEL HARDWARE PROTECTION SOLUTION
External Firewall Layer
This is the main security layer used to fight against attacks from the external environment such as hackers, viruses, spam… protecting the system to minimize negative impacts from the outside. When connected to the external environment. In reality: the risk of intrusion into the internal system of the enterprise from external objects (such as hackers, viruses…), the information provided to users/customers MUST be intact and authorized users from the outside can EASILY access it.
Intermediate security layer
This security layer is mainly based on the basic security features of network devices, operating systems, etc. For example, with high-end network devices, we can deploy basic network security features such as:
- Access control list restricts end-user access to areas and applications that are not within its scope of access.
- Set access rights via username, password
- Limit connection to the system (physical connection) at unauthorized locations via port security, VLAN access control list of network devices.
- VLAN partitioning limits useless data (Broadcast, ARP signal…) from flooding from one area to another, maximizing bandwidth for useful information (real user traffic) of the system. Prevent the spread of viruses or related effects due to hardware system instability from one area to another.
etc.
Firewall protects server system (server farm) – internal firewall
The internal firewall subsystem plays a very important role as the final security barrier to protect the entire data system of the enterprise. This subsystem is also the control gateway before entering the most sensitive area of the system, which is the central server area. The special point here is that in addition to preventing attacks from the external environment from entering the system, firewall devices must also analyze accesses from within the LAN, filter and prevent attacks originating from within. Furthermore, due to such importance, firewall devices in this subsystem must be of the type with high processing capacity (throughput) and especially have the ability to operate as an IPS (Intrusion Prevention System) device.
The data center is where all the invaluable assets of the business are stored in terms of finance, customer information, etc. Therefore, in this vital area of the system, we need to have the highest security protection solution within the technology’s capabilities. (see illustration diagram).
With many years of experience in the field of network security, our company is committed to providing comprehensive security solutions to minimize potential risks to the business’s computer network system. The solution is built with equipment from the world’s leading security vendors such as Fortinet, Watchguard, Astaro… from basic to integrated with many levels of security – including firewall, anti-virus, intrusion prevention, VPN, web content filtering, spyware prevention and anti-spam – designed to help customers protect against potential risks at the content level across the entire system of small to large-scale businesses.
