System security solutions - Information Security

For now owns the data and resource protection requirements, monitoring usage closely. The data and resources is the storage and processing of data related to customers and businesses with great value. Through this data, financing is being circulated in the order and strict rules. If the data and this process is interfered invalid, it will surely happen disorder and significant damage to business reputation and loss of that enterprise.

By working closely with organizations active in the field of security systems in the world famous company, we always ensure to provide customer solutions for system security under 06 level (group organizational, legal, operating, commercial, financial and human) in accordance with the standards of ISO 27001: 2005 for 10 elements (security policy, organization, classification and control of resources, security personnel security and physical environment, operational management, and communications, access control, maintenance and improvements, ongoing management, compliance) could affect the security of business information 3 Industry to ensure its attributes: reliability (confidentiality), integrity (integrity) and availability (availability).

Based on this standard, our company always provides solutions for security system, depending on the level of each business with the minimum of components such as:


Firewall outer layer

This is the main class specialized security against attacks from the outside environment, such as hackers, viruses, spam ... .bao protection systems to minimize the adverse impacts from outside. When connected to the external environment. In fact: the risk of intrusion into the internal systems of the business from external objects (such as hackers, viruses ...), information provided to the user / customer MUST be integrity and the user is allowed from outside EASILY accessible.


Intermediate layer of security

This security layer is mainly based on the basic security features of network devices, operating systems, ... For example, with high-end networking equipment we can implement network security features such basic :

Access control lists restrict end-user access through the partition, the application is not within the scope of his access.
Set up access via username and password
Restrictions connected to the system (physical connection) at the location is not allowed through the port security feature, VLAN access control list of network devices.
VLAN Zoning restrictions useless data (Broadcast, ARP signal ...) filled from this area over other areas, maximize bandwidth for useful information (real user traffic) system . Virus prevented diffusion or affect joint stability due to the absence of hardware systems from different areas across the region.

Firewall server protection system (serverfarm) - the internal firewall

Internal firewall module (internal firewall) plays a very important role as ultimate security barricades protecting the entire system of corporate data. This system is also the gateway control before going into the most sensitive areas of the system, is an area of central server. A special feature here is in addition to preventing attacks from the external environment from entering the system, the firewall device must also analyze the access from both the LAN, filter and prevent attacks comes from within. Furthermore, because of such importance, the firewall device in this system is kind of processing capacity (throughput) and especially high performance devices such as Intrusion Prevention IPS (Intrusion Prevention System).

Data center is a place to contain all invaluable assets of the business in terms of financial, customer information ... so in areas vital importance of system we need a security solution highest safety in the possibility of the technology. (see schematic illustration).


Anti-virus software for clients (end-users)
This is an indispensable component for a system capable of preventing penetration higher, against the infection from inside the environment caused by the user.

Solution to prevent data loss (Data Lost Prevention)
With experience in designing security solutions for professional system, we guarantee to provide customers with solutions that avoid loss of information, such as copy protection information from the system and fight to email sensitive files attached predetermined ... to support the business, especially manufacturing firms, banks .... minimize the possibility of theft or important information "highway" through information with competitors.

Physical security solutions for server rooms

In addition to the above solutions, our company also provides solutions for monitoring physical security for the server room, such as access control systems, surveillance camera systems dedicated for a room ... server (see details)

System monitoring and system administration information security
Any network security systems modern though he would he would not unleash effect if there is no monitoring system helps administrators detect and prevent the unauthorized entry and provide timely solutions The next support measures. Therefore, the network security solution Gensys, we always advice customers equipped with this system, depending on the level appropriate for most business within the budget allows.

Develop security policies for the enterprise

This is one of the critical components are of great influence to the security system. Therefore, our company always have the expertise to be trained to be the most professional enterprises with building-specific security policies and appropriate for each business / organization specific.

With many years experience in the field of network security, our company is committed to providing a full range of comprehensive security solutions to minimize the risks that may occur to the system of corporate computer networks. Solutions built with equipment from leading security companies such as Fortinet, Watchguard, Astaro ... from basic to very much integrated security level - including firewall, antivirus, intrusion blocking integration, VPN, web content filtering, blocking spyware and anti-spam - ​​designed to help customers protect against the potential risks at the level of content across the entire system of small-scale enterprises to large.

Managed VPS servers simple

Management system based on Web-based, detailed management interface designed a simple, handy and most comprehensible allows customers to manage all resources are licensed and resource allocation for virtual servers .


Easily upgrade virtual server configuration

Virtual server resources to easily upgrade the RAM, HDD, Bandwidth. When needed just to raise the limit of resources for virtual server or create new virtual servers to cater for the growth of the business.


Deploy new virtual server level quickly

New grant a virtual server, install and put into operation VPS server quickly on resource management interface of VMware Server ESXi 5. Restore, reinstall, or install new virtual servers quickly and easily easy.


VPS server high availability

Virtual servers have mechanisms to monitor the status of servers and VPS customers will enjoy the benefits of automated systems switch between servers where one administrator module virtualization trouble .