The danger within security systems lies in the attack from unknown threats. Most security systems are built based on the existing knowledge of known threats. If something attacks our system we learn from it and we propose defensive measures. Examples of this are door locks, which will continue to improve with each home break-in made possible by hijacking the door lock. Something must be overcome in order to strengthen security measures. In data networks, it works similarly: firewalls, IDP systems and anti-virus programs are developing and improving from observing successful attacks. It would, of course, be ideal to be able to predict the initial attack before it occurred- this leads the function of analyzing the behaviour of systems. If there is a deviation from the standard behaviour, we address it and we get an opportunity to respond in order to protect your network before an attack occurs.


NBA (Network Behavior Analysis) is a system of anomaly detection and irregularities in behaviour in the data network, based on a permanent evaluation of statistics on network traffic. The aim is to reveal operational problems increase the level of external and internal security of the data network. The main advantage over conventional IDS systems or SNMP monitoring is to focus on the overall behaviour of the devices on your network, allowing you to respond to unknown or specific threats. Monitoring of network communications and NBA are among the most important technologies for network protection.

More Less

Active network security

Most of today’s networks is protected from Internet attack considered to be the greatest safety risk. In reality an overwhelming majority of attacks at corporate networks is lead from inside the corporation – from the local network. Corporate local network are expanding and it is often complicated to retroactively map all active ports; standard Ethernet hubs are added to locally increase the number of ports. At the same time more and more users access the network wirelessly both from company and private laptops and from various mobile devices as well. It is almost impossible to find out who connected from what location, to what application and what data was transferred. We do not know an exact address plan, we reserve addresses that are unused for a long time. In case of an attack we are defenseless and we cannot identify the attacker.

Solution details

DDoS Protection

DDoS attacks are nothing new, and the principle is simple. The attacker is trying to "overwhelm" the service (application servers, infrastructure, etc.). Lately, however, we may experience a significant increase in these attacks. Increasing not only their frequency but also the duration (in the world are now even users who are under constant attack), complexity (the attacks are thoroughly prepared and often combine more than 5 ways). There are increasing a different goals. We can say that today there is no firm or a market segment that could not become victims.

Solution details
Do you wish to receive our newsletter? Yes, I am interested



I give consent to the company VUMS Datacom, Ltd. based Lužná 591, 16000 Prague 6, ID: 48585611, registered in the Commercial Register of the Municipal Court in Prague, Section C, File 17811, to collect and process in accordance with law no. 101/2000 Coll. as amended, my name and e-mail address and other personal data provided for inclusion in the database in order to offer products, services and sending commercial messages by electronic means pursuant to applicable law no. 480/2004 Coll., on indefinitely until further notice.