Prevent loss of connections, enhance security!

Generally speaking, the problems with the Company's network can be encompassed in two broad categories:

  • Loss of connections - This will prevent access: to the internet, printers, computers, servers, and others. It is clear that this is a critical problem because the lack of communication, internal or external, causes the isolation of individual jobs or entire sectors and, ultimately, the entire Company;
  • Security Policies - Implementing a security policy is the essential condition for the network to meet its objectives. The security policy encompasses several standards, such as access rules and registration of actions performed by each user.

Obviously a company with 10 computers connected to a network will not need a network project identical to that of a 100 company. But clearly it needs a minimally consolidated network design. And in this project, the respective security policies must be defined. That is, as in everything, there must be "rules" for the use of the network. This will reduce the likelihood of virus entering the network, for example.

he definition of security policies is a key factor in the choice of network equipment. A company with 10 hosts (computers, printers, smartphones ...) will not need equipment whose cost can reach thousands of euros, but also does not solve the problem with a SOHO (Small Office and HOme router) of 30 euros. It needs equipment that, for example, allows you to configure only access to certain equipment and that can inhibit access to certain sites, among other options.

We help SME implement a structured, small or medium-sized network with the highest level of security possible (there are no 100% secure systems). An example of the sequence of a network project:

  1. Needs Analysis - Analyze needs and establish security policies;
  2. Network Design - Define the physical structure (network design) and establish the logical structure (addresses of each host, MAC locks, etc.);
  3. Simulated Testing - Using simulation software, test the physical and logical structures;
  4. Set Equipment - Define equipment to be acquired, for example, wiring, router, switch, among others;
  5. Instalar Rede - Connect all components, configure and test.

If you need our services to solve other issues related to networks, do not hesitate to contact us!

Network Security and Availability

Some Causes of Network Failure

Downtime caused by network problems has a major impact on the business.

  • Incorrect configuration - is the cause of about 80% of unplanned outages. Incorrect assignment of ip, error when entering MAC permission, error opening ports, are some examples.
  • Security breaches - Security breaches and unauthorized traffic can knock down a network due to overloading. This overload can be caused by a virus that will quickly spread across all hosts.
  • Obsolete Equipment - All obsolete and unsupported devices are a potential threat to network operation, not only performance but also security. It is preferable to dispose of obsolete equipment and buy a new one, rather than take risks.
  • Human Error - Along with configuration errors, people make mistakes that can be as simple as turning off the wrong cable or not knowing the correct procedure. To avoid such errors, you must take actions such as proper team training, have adequate and up-to-date documentation and include labels on all devices.
  • Incompatible changes - Changes to the network configuration made by, for example, "someone trying to unpack" and change an ip address out of range. The existence of records of the current devices and configurations is a way of avoiding the issue.
  • Hardware failures - Any device can fail. Preventive maintenance, such as firmware upgrade, reduces risk. A more expensive way is to create redundancy to prevent a single point of failure from disrupting the entire network.
  • Power failures - If the fault is of the electricity supplier, the reduction of the risk has an almost incom- patible cost (to install an emergency generator ...). But it can reduce some of the risk if you have a well-implemented backup policy. & Eacute; It is convenient to have extra power supplies for the equipment (commonly called "transformers"), because if a fault occurs, the replacement takes a few minutes and will not have a big impact on the work.

Some Examples of Network Security Policies

  • Improves data protection;
  • Extends the useful life of the components;
  • Improves equipment stability;
  • Reduces the number of faults;
  • It detects procedural flaws and helps you implement system usage policies / rules.

Network Maintenance / Management

The management of a small / medium-sized network can be done remotely, which allows a significant reduction of costs.
Some network maintenance and management tasks:

Network sub-system (hardware and users)

  • Fault Management - Some current equipment emits alert logs when network anomalies are stuck. These alerts can be configured to be sent automatically via e-mail.
  • Configuration management - Changes of addresses, permissions and similar;
  • Gestão de segurança;
  • Backups de Equipamento de rede - para recuperar de problemas de rede, é necessário efetuar backups sempre que se fazem alterações;
  • Firmware Updates - updating the firmware of the equipment, allows the correction of hardware and security problems;
  • Inspect the internal components - check wiring harness. Check component fitting;