IT Security Services
Security is one of the IT components, which in reality often remain understated due to the fact that investment in IT security doesn’t generate directly value and income.
This is where theory and practice often vastly move apart.
Theory is that managers and IT specialists unconditionally agree about the importance of security for company’s IT infrastructure, software and intellectual property.
Practice is that when time and budget are limited, the investment in security is often postponed for the indefinite future.
At LinkCity we don’t look for isolated and temporary solutions of the problems and the aims of IT security.
In this way our clients could easily define their needs and the most efficient solutions for the particular moment and for a future time period.
IT Security Services offered
-
Network Security
This service concerns the internal network security. It is a scope of policies and procedures for system administration. The correct planning and implementing allow protection of particular resources and data on the network, implements access policies, isolates and signals for unwanted and malicious activities.
Firewall
Firewall is a main instrument of network security for the protection of your network from unwanted access and some types of hacker attacks. The firewall is a system that sets control access policies at the entrance of your network. The firewall defines which of the local services can be accessed from outside and vice versa. There is a wide range of instruments and means to realize such restrictions but generally firewalls can be regarded as a pair of mechanisms: one of the mechanisms blocks traffic and the other permits it.
Security of Internet Applications
At LinkCity we can offer services for security of web servers, mail servers and web applications for small companies that are facing a specific security threat and for large corporate clients who wish to increase and set to a new level their security standards.We provide complete and contemporary solutions for real-time intelligent inspection of the entire incoming and outgoing traffic.We offer peak performance and professional selection of integrated solutions that enable comprehensive content control, including traffic from legitimate sites, encrypted traffic and web based application.Additional options of the service are: filtering and dynamic classification if internet addresses, control over the browser and the add-ons, limited access to defined by the client internet sites, monitoring of applications for online communication as Skype, ICQ, and web-based e-mail applications. -
Antivirus
We will consult you to determine the appropriate antivirus software both for single workstations, and server solutions with automated installation, control and monitoring.
-
Monitoring
LinkCity offers the possibility for professional monitoring of your entire IT infrastructure or separate elements.
Depending on the needs and the agreements we are capable of providing monitoring 24/7(24 hours, 7 days in the week) or 8/5(8 hours, 5 days in the week) with reaction time from 10 minutes to 12 hours.
-
Audit
LinkCity conducts audits of planned or existing IT infrastructures, services, and applications. Audits, tests, and consequent reports are executed by qualified and certified in their corresponding fields specialists in compliance with the established standards and good practices.
Our services involve:
- assessment of external attacks vulnerability;
- tests for unwanted penetration for network, server, and web applications;
- wireless network security audit;
- audit of policies and procedures for Data Loss Prevention;
- audit of Firewall and VPN services configuration;
- audit of IDS/IPS services configuration;
- audit of security on physical level;
- audit of access control and authorization security;
- audit of end-user security control procedures;
- audit of IT security policies and procedures.
The audit of planned IT infrastructures, services, applications and activities can be used for independent control and supervision on planning and/or implementation.