Security solutions:
Installation and configuration of cisco ASAS Firewall
Installation and configuration of UTM (Unified Threat Management)
Installation and configuration of virus & spam blocker appliance
Installation and configuration of Kaspersky antivirus
Network equipments deployment :
Switchs and routers installation and configuration
Wireless Network Installation andconfiguration
Maintenance préventive :
Preventive maintenance :
Prerequisites:
Days of Training: 5 days training
PURPOSE: CENTRALIZE COMPUTER PARK MANAGEMENT
INVENTORY:
♣ The equipment (motherboard, network card, disk, ...)
♣ The system (BIOS, OS, environment variable, ...)
♣ The installed devices (mice, keyboards, screen, ...)
♣ The network (MAC address, IP, Domain / Workgroup, ...)
♣ The software installed
SOFTWARE DISTRIBUTION
♣ Multiple distribution method (push, pull, at the request ...)
♣ Managing and Using Intelligent Network:
Peer download,
Targeted Multicast,
Dynamic bandwidth management,
Go on delivery failure
♣ Management of different geographic locations and via mobile download servers Preferred - No specific infrastructure!
REMOTE CONTROL FOR ASSISTANCE:
♣ Decision-hand
♣ Discussion
♣ File Exchange
♣ View Only
♣ Drawing (teaching method)
♣ Remote Command Execution
MASS DEPLOYMENT OF OPERATING SYSTEMS AND MIGRATION PATTERNS OF USERS:
♣ ImageW and ImageW.v2
♣ Symantec Ghost, Microsoft ImageX, ...
♣ Win PE, PE DOS, Lunix and OSX PE PE
MONITORING OF LICENSE APPLICATIONS
MANAGEMENT OF SAFETY PATCH MANAGER IS A UNIT OF:
♣ Download / update the definitions of vulnerability
♣ Configuring managed devices for analysis
♣ Reading and Organizing Information
♣ Creating and configuring security policies and analysis tasks
♣ Analysis of the results of scan
♣ Download patches for vulnerabilities found
♣ Deployment and installation of patches on vulnerable positions
♣ Checking the installation state and the history of corrections
BLOCKING APPLICATIONS
♣ List of predefined application block provided by LANDesk
♣ Personal applications can be added to this list
♣ Blocking unwanted applications by the administrator or not corresponding to standards (blacklist)
♣ Allows to raise the level of security
♣ Blocking the signing of the application and not on behalf
ANTI-VIRUS
HIPS (HOST INTRUSION PREVENTION-BASED SOLUTIONS)
Purpose: Checks and automatically restricts the behavior of certain applications so that any malicious code cannot compromise the safety or stability of the system
♣ Protection against abnormal behavior
♣ Filtering attachments to emails and downloads
♣ Protection of vital files against changes
♣ Protection against changes in the system boot the machine
♣ Certification life applications using the MD5 algorithm from RSA Data Security
♣ Blocking execution of applications from removable drives
♣ Contains the list of authorized applications
♣ Allows to refuse any application
♣ Active protection when no patch is available to counter attack
♣ Protection against zero-day attacks
♣ Overall LANDesk Management Console
♣ Integration of security policies HIPS with the strategies of other modules (integrating in the same agent LANDesk)
♣ Reporting module integrated in the same administrative console
♣ Provides control over what applications can be executed on a workstation
♣ Detects and removes rootkits and hidden processes
♣ Detects and warned of problems with services, the startup process and ActiveX controls
♣ Used to prevent accidental starting or stopping processes
♣ Protection of system files and registry
web design Specialist , we invite you to control your Internet project. We carry with you a clear specifications , we develop a graphic web and we provide quality technical integration..
We begin all projects of website creation by a key exchange with you ( by appointment at our offices or by telephone.
This interview is used to define an initial specification to:
This specification will be a necessary support for smart development , it will also provide you with a quotation for carrying out your website.