contact

  • Matériels réseaux (switchs, routeurs)  Vente
  • Téléphonie IP et accessoires (téléphones, casques...)
  • Matériels liés à la sécurité (Firewall, Appliance de sécurité)
  • Matériels liés à la mobilité (bornes wifi)
  • Serveurs et pcs fixes et portables (Dell, HP, Toshiba ...)

Maintenance préventive:

  • Mise à jour des versions des systèmes d'exploitation adaptées aux équipements réseaux

Maintenance curative:

  • Intervention sur site Main-res
  • Echange standard de matériels suivant
  • le contrat de maintenance
  • Réparation de matériels
  • Assistance téléphonique
  • Astreinte 7j/7 en heures non ouvrées

Prerequisites:

  •  Materials: 1 PC per person, a server machineLandesk
  •  Software: Operating system Windows Server 2003 or 2008, vmware, framework latest version, IIS version 6 or later

Days of Training: 5 days training
PURPOSE: CENTRALIZE COMPUTER PARK MANAGEMENT

INVENTORY:

  •  Motor inventory based on different standards: SMBIOS, DMI, WMI and APIs "Plug & Play"
  •  Programming inventories or demand.
  •  Put together information on:

♣ The equipment (motherboard, network card, disk, ...)
♣ The system (BIOS, OS, environment variable, ...)
♣ The installed devices (mice, keyboards, screen, ...)
♣ The network (MAC address, IP, Domain / Workgroup, ...)
♣ The software installed

  •  Ability to provide feedback Custom (forms)

 


SOFTWARE DISTRIBUTION

  •  Benefits LANDesk

♣ Multiple distribution method (push, pull, at the request ...)
♣ Managing and Using Intelligent Network:
Peer download,
Targeted Multicast,
Dynamic bandwidth management,
Go on delivery failure
♣ Management of different geographic locations and via mobile download servers Preferred - No specific infrastructure!

  •  Manage interactions with users (silent timing, early warning of distribution, customized message in case of problems, success message, user portal)

REMOTE CONTROL FOR ASSISTANCE:

  •  Various connection modes:

♣ Decision-hand
♣ Discussion
♣ File Exchange
♣ View Only
♣ Drawing (teaching method)
♣ Remote Command Execution

  •  Different security mode
  •  Manage user permissions
  •  Managing Network Connections
  •  Logs

MASS DEPLOYMENT OF OPERATING SYSTEMS AND MIGRATION PATTERNS OF USERS:

  •  Includes a tool for imaging system

♣ ImageW and ImageW.v2

  •  Supports other tools of imaging market system:

♣ Symantec Ghost, Microsoft ImageX, ...

  •  Supports pre-boot environments:

♣ Win PE, PE DOS, Lunix and OSX PE PE

  •  Includes a tool for capturing user profile: system and applications.

MONITORING OF LICENSE APPLICATIONS

  •  Detection of applications on machines
  •  Define customizable application
  •  Monitoring the use of applications in machine
  •  Control software license compliance

MANAGEMENT OF SAFETY PATCH MANAGER IS A UNIT OF:

  •  Analysis of vulnerabilities and update
  •  Vulnerabilities systems: Microsoft Windows - Mac OS - Linux - ...
  •  Vulnerabilities software: Microsoft, Adobe, Mozilla, Java, Flash
  •  Custom definitions custom
  •  Collection and dissemination of patches
  •  Centralized patch
  •  Dissemination programmed, selective, automatic
  •  reporting and alerting.
  •  Generating reports
  •  Archiving
  •  Overview of the state park / accurate view of a machine
  •  Workflow - Workflow

♣ Download / update the definitions of vulnerability
♣ Configuring managed devices for analysis
♣ Reading and Organizing Information
♣ Creating and configuring security policies and analysis tasks
♣ Analysis of the results of scan
♣ Download patches for vulnerabilities found
♣ Deployment and installation of patches on vulnerable positions
♣ Checking the installation state and the history of corrections


BLOCKING APPLICATIONS

  •  Detection

♣ List of predefined application block provided by LANDesk
♣ Personal applications can be added to this list

  •  Refusal to comply

♣ Blocking unwanted applications by the administrator or not corresponding to standards (blacklist)
♣ Allows to raise the level of security
♣ Blocking the signing of the application and not on behalf

ANTI-VIRUS

  •  Detecting rootkits
  •  Right-click in Windows Explorer
  •  Temporarily disable the antivirus
  •  Mini scan memory
  •  Pause possible analysis
  •  Detection and elimination of hazards ("database extension")
  •  Content Engine Kaspersky
  •  Quarantine malicious files (on server)
  •  Updated definition files (deployment definitions "pilot")
  •  driver gradual deployment of updates
  •  Analysis of the Outlook email
  •  Reporting / Alerts / Scoreboard

HIPS (HOST INTRUSION PREVENTION-BASED SOLUTIONS)
Purpose: Checks and automatically restricts the behavior of certain applications so that any malicious code cannot compromise the safety or stability of the system

  •  Multiple levels of protection

♣ Protection against abnormal behavior
♣ Filtering attachments to emails and downloads
♣ Protection of vital files against changes
♣ Protection against changes in the system boot the machine
♣ Certification life applications using the MD5 algorithm from RSA Data Security
♣ Blocking execution of applications from removable drives

  •  Security based on a principle of White List

♣ Contains the list of authorized applications
♣ Allows to refuse any application

  •  Protection against Buffer Overflow
  •  Benefits

♣ Active protection when no patch is available to counter attack
♣ Protection against zero-day attacks
♣ Overall LANDesk Management Console
♣ Integration of security policies HIPS with the strategies of other modules (integrating in the same agent LANDesk)
♣ Reporting module integrated in the same administrative console
♣ Provides control over what applications can be executed on a workstation
♣ Detects and removes rootkits and hidden processes
♣ Detects and warned of problems with services, the startup process and ActiveX controls
♣ Used to prevent accidental starting or stopping processes
♣ Protection of system files and registry

Teacher in various subjects:

  • Network
  • Wireless Security
  • IP telephony
  • Virtualization
  • IT Project management

Communicate effectively by reaching the right resource the first time. Now small business can deploy an affordable,Voip easy-to-manage communications system with Cisco Unified Communications 500 Series for Small Business.

The series supports:

  • From 8 to 104 users in flexible deployment models based on your needs
  • A wide array of IP phone models
  • Public switched telephone network (PSTN) interfaces
  • Internet connectivity with security services
  • The series eliminates the need for multiple servers and combines voice, data, video, security, and wireless capabilities. It integrates with existing desktop applications such as calendar, email, and customer relationship management (CRM) programs..