Traffic Control

Today's data networks provide the ability to connect to a wide range of technologies and users have the opportunity to get onto the network anywhere at anytime. Every user has different needs and uses different applications. What they have in common are the requirements for the response of key applications. If we access bank applications, company applications or business critical applications we require quick and reliable responses regardless of the time of day. Operators and data centers must provide customers with seamless access to such applications, including guaranteed SLA.

 

From the operator's point of view it is necessary to manage each access line and separate critical data with guaranteed SLA from ordinary data without the need for a quick response (SLA). There are plenty of applications for downloading files, playing games, on-line video viewing, listening to audio and access to social networks. Behind a few network ports hundreds of different applications are hidden and the operator must recognize and apply the appropriate SLA for each connection. In terms of data centres its a similar situation as SLA is defined by its accessibility and performance of applications and this is controlled by load balancers- ADC (Application Delivery Controller). Well balanced traffic control of data networks and access to applications within data centers greatly increases user QoE.

 

More Less
SOLUTION LIST

Active network security

Most of today’s networks is protected from Internet attack considered to be the greatest safety risk. In reality an overwhelming majority of attacks at corporate networks is lead from inside the corporation – from the local network. Corporate local network are expanding and it is often complicated to retroactively map all active ports; standard Ethernet hubs are added to locally increase the number of ports. At the same time more and more users access the network wirelessly both from company and private laptops and from various mobile devices as well. It is almost impossible to find out who connected from what location, to what application and what data was transferred. We do not know an exact address plan, we reserve addresses that are unused for a long time. In case of an attack we are defenseless and we cannot identify the attacker.

Solution details

WAF - Web protection without interfering with the application

Although a number of security products perfectly understands communication (ie. The HTTP protocol) onlyWAF can understand also the structure and logic of a particular application, which is always unique. Nothing can protect your site better than the Web Application Firewall. And no need to interfere with any existing application.

Solution details
10
:72:70:119:
Do you wish to receive our newsletter? Yes, I am interested

Získejte

DOKUMENT ZA KONTAKT
popup





I give consent to the company VUMS Datacom, Ltd. based Lužná 591, 16000 Prague 6, ID: 48585611, registered in the Commercial Register of the Municipal Court in Prague, Section C, File 17811, to collect and process in accordance with law no. 101/2000 Coll. as amended, my name and e-mail address and other personal data provided for inclusion in the database in order to offer products, services and sending commercial messages by electronic means pursuant to applicable law no. 480/2004 Coll., on indefinitely until further notice.