Your business can count on a secure, available and efficient environment. The firewall forms a crucial link in this context. Combell provides firewall solutions based on different products from several suppliers.
Combell carries out the implementation and the follow-up of the network, applications and spam firewalls. We take on the entire management. We develop the rules for the firewall and set the thresholds. With an application firewall, you get additional security at the level of the application. The firewall prevents abuse of your website. A spam and antivirus firewall keeps possible infections away. Over the years, Combell has built considerable experience in the area of this functionality.
Data are your dearest possessions. That is why you should always be very careful when it comes to storing and securing your company data.
Designing the best suitable backup solution is a custom piece of work on its own. Indeed, every company environment is different. The type of backup solution depends on several factors: the data volume, the speed at which the data volume evolves and the way it evolves, the preference for on-site or off-site data storage, etc.
In order to avoid virus infections, Combell installs antivirus software on your servers. To do so, Combell chooses software that delivers the best possible results, combined with the lowest memory usage, the lowest disk space usage and the less system slowdown.
Moreover, Combell has a central management console for the follow-up of the used antivirus system. That enables us to react very swiftly when there is a threat on the network. For antivirus protection, Combell's preference went to the software of ESET.
Encrypted communication is routed through a VPN tunnel. That is an encrypted connection over the Internet that connects networks together. From one LAN (e.g. the company network), there is a connection to another LAN (e.g. the data centre).
In addition to such a fixed LAN-to-LAN connection through a secured Internet connection, it is also possible to use VPN tunnels for temporary point-to-point connections. That sort of VPN tunnelling is popular among companies that want to give their employees secure remote access to the company network or to the data and the applications in the data centre.
When using VPN tunnels, Combell never sends readable information over the cable or the Internet. While VPNs are generally used for private purposes, Combell also offers the possibility to use SSL for securing communications with publicly accessible websites.
Combell uses several techniques and technologies to detect intrusions on the network and react - automatically or not - as adequately as possible.
Combell uses, among other things, the results provided by honey pots. Those are places on the Internet where malicious codes and other viruses are collected. They offer information that makes it possible to update firewalls and other protection systems.
In the context of the security of your environment, Combell combines prevention and detection. We do all we can to detect and intercept possible threats before they reach your environment. If this fails, we have enough measures in place to immediately detect the infiltration and take adequate action.