Solutions

Advanced Wireless Last Mile

It is often little things than make the end customer satisfied or unsatisfied. Even good and inexpensive service may be perceived negatively if it demonstrates a fault, even just now and then. As an example, we can name fluctuating system’s response during online gaming, jamming pictures while streaming a sports tournament, or voice stuttering during an important Skype call. What that for 99% of the time such a service works fine if it fails at the most critical moment? The customer will be annoyed, to put it mildly.

Solution details

Active Network Security

Most of today’s networks is protected from Internet attacks, considered to be the greatest security risk. An overwhelming majority of attacks at corporate networks is lead from inside the corporation – from the local network. Corporate local networks are expanding, and it is often difficult to perform retroactive mapping of all active ports; standard Ethernet hubs are added by employees to increase the number of ports locally. At the same time, more and more users access the network wirelessly, both from company and private laptops, in addition to various mobile devices. It is almost impossible to find out who connected from what location, to what application and what data were transferred. We do not know the exact address plan, and we keep reserving addresses that are unused for a long time. In case of an attack, we are virtually defenseless, unable to identify the attacker.

Solution details

WAF – Web Protection without Interfering with the Application

Although there are many security products that perfectly understand communication at network and transparent level (i.e. the HTTP protocol), only WAF can also understand the structure and logic of a particular application, which is always unique. There is no better website protection than Web Application Firewall. And there is a bonus of zero interference with the existing application.

Solution details

DDoS Protection

The idea of an DDoS attack is simple: the attacker is trying to “overwhelm” the service (application servers, infrastructure, etc.). Lately, however, we have experienced a significant increase in these attacks. There is an increasing frequency of these attacks, in addition to their duration (globally, there even are users under permanent attack) and complexity (attacks are thoroughly prepared, often combining more than five different ways). The number of different goals is also increasing. We can say that these days virtually any company or a market segment can become a victim.

Solution details

Distributed Network Functions – uCPE

In connection with SDN there are discussions about applications that are offered by this open network architecture. There is a new application interface that offers access to applications without regional boundaries while network functions are virtualized. The term Network Functions Virtualization (NFV) is often mentioned in this context – it means functions that are in fact independent of SDN, while NFV can utilize the open nature of the SDN interface to the maximum. We need to deliver applications (network functions) to the customer dynamically, based on customer’s current needs. Majority of such virtualized functions will remain in the data center, being allocated to customers dynamically. But there are also functions that we would wish to virtualize, and these must be implemented at the customer. We need an open platform for terminal devices that would allow us to allocate network functions dynamically as needed, thus we need distributed NFV.

Solution details

Ethernet over any Media

Data communications are known for the variety of their communication protocols and interfaces. Throughout the decades of their development, various interfaces have been created for data transmission, while all these interfaces are dependent on communication protocols and devices connected to them. With each such new interface the complexity of the network has increased, while its maintenance has been extremely demanding. When we need to provide a service, whether to the customer or internally within the organisation, each new type of a physical interface makes service provisioning more complicated and expensive. Ideally, we would have a single physical interface able to provide various services.

Solution details

Guaranteed-SLA Ethernet Services

Internet connection is now commonplace, whether it is a home, a small business or a large corporation. Compared to its early times, Internet bandwidth is enormous. The goal has been reached from the user’s perspective, as we can stream HD movies faster than we can watch them. Thanks to high network bandwidth we can move most of the data to various data centers and clouds. Increasingly we are using applications running directly at the private or public cloud rather than our local servers. We are becoming dependent on data connection and we cannot work without it.

Solution details

Data Acquisition According to Business or Legal Requirements

Information on data being transferred and users who communicated, with whom and when, represent the most-important security building block, whether it is an organization, an institution, or the state. As the network infrastructure has developed and its complexity increased in recent years, it is becoming more and more difficult to provide sufficient reliability, security and availability of computer networks. Traditional SNMP monitoring tools are therefore no longer sufficient to cover administrators’ needs. This opens new opportunities for modern network traffic monitoring technologies based on data flow analyses, providing a detailed network traffic overview. Today’s IT environment administration should be based on computer network monitoring by means of data flows. Such a solution can save both time and costs, in addition to various benefits for both small and large companies or organisations.

Solution details

Interconnection between operators - new business opportunities

Ethernet operators’ interconnection is now quite common, but Ethernet is mostly used only as a transport medium for IP transmission between two nearest network nodes. The actual interconnection of operators, ISPs and data centers is thus at the third OSI model layer, with IP playing the key role. However, there are many applications where IP ultimately does not meet application technical requirements, while also making solutions very expensive. Which is why we still use TDM-based circuits that meet high SLA customer demands. Carrier Ethernet connects these two worlds, i.e. the flexibility and the throughput of IP networks and SLA demands known from TDM networks. The Carrier Ethernet allows us to create a data circuit via multiple operators with an end-to-end measurement. Unlike TDM networks, the Carrier Ethernet offers higher throughput for much lower costs, even when compared with IP-based networks.

Solution details

Wireless connection as alternative to optical fiber

Optical fibers are currently the most popular data transfer medium at all levels of communication and data networks. They provide enormous transport capacity while maintaining high reliability and resistance to failures and interference. Optical cable laying, however, is demanding in terms of time and capital costs, and it is often complicated as well. There are locations where optical cables cannot be installed at all. Often there are various obstacles such as roads, watercourses or regulations for the care of historical monuments, which make digging in historical centers impossible.

Solution details

WDM – Multipurpose Optical Fibers

The use of optical cables as a data transmission medium has been under consideration since 1950s. The first optical cables were laid in 1970s; however, their massive use has started later thanks to the significant decrease of fiber attenuation along with the development of related technologies, namely transceivers. Nowadays, optical cables and related technologies are commonly affordable, while laying of optical cables is considered a good and promising investment.

Solution details

Malware, Ransomware and Phishing Blocking, Vulnerability Analysis

ICT security is a dynamic process requiring to keep pace with constantly evolving environment of cyber-threats. One of successful approaches is detailed and continuous vulnerability analysis, not only at the network perimeter, but also at individual end-points, as well as across the whole intranet. NetSHIELD provides protection against proliferation of malware, ransomware and phishing. Through automatic audits and identification of known vulnerabilities you are provided a tool to identify network weak points. Finally, it offers next-generation access control solutions for mobile and fixed devices connecting to LAN. It therefore provides the key functions for the whole security chain. You are provided an overview and control over untrustworthy network activities through dynamic control of all devices across the network. NetSHIELD is a non-inline device, which means it can be connected anywhere to identify and isolate a problem from any place.

Solution details

Last 100m Access Technologies

New applications are ever more demanding in terms of bandwidth. Both in households and businesses there is an increasing number of HD video devices, it is common to synchronize cloud data, and the volume of data keeps rising; speeds below 100Mbps are therefore no longer sufficient. We need to get close to gigabit transmission rates, or at least multiples of 100Mbps. Because of high costs, we are unable to provide a special optical connection for each user, so we need to get over the last 100m using the media currently available.

Solution details

SCADA Security

Traditionally, control systems are separated from secure networks, such as a corporate IT network and the Internet. As a result, their separation combined with physical and safety precautions could be deemed sufficient to ensure industrial control systems’ security. More and more companies with industrial control systems start to connect their OT networks with IT networks, thereby making OT networks more accessible to potential attackers.

Solution details

Data Center Application Access

The number and the capacity of data centers grows along with the volume of data being transferred and stored. It is expected that monthly data transfer of more than 6 million users is going to exceed 1TB next year. Until recently, an average smartphone user would do with a data tariff of hundreds of megabytes per month, while today we are aiming at tens of gigabytes. Data centers require uninterruptible source of power (with a backup), cooling, security control, firefighting measures, suitable HW and SW incl. redundancy, high-capacity and multiple network infrastructure, incl. data traffic security and control. It is the data traffic security and control that we specialize in.

Solution details

SD-WAN

Software-defined WAN (SD-WAN) is a specific subsection of the Software-Defined Networking (SDN) technology, applied to WAN networks. These are most often used for interconnecting enterprise networks, regional and global branches and data centers, including private and public clouds.

Solution details

Data Traffic Control – a Solution for ISPs

Network infrastructure quality, capacity and availability have enjoyed rapid development in recent years. Nowadays, Internet connection is available virtually anywhere, and it is often a broadband one. However, this causes many challenges for ISPs (Internet Service Providers), responsible for most of capital costs, without the ability to control actively the efficiency and bandwidth usage. File downloading, emails, on-line games, streamed video, chat, P2P networks – all these data keep flowing without control, possibly congesting network connectivity, slowing the network down and making it more expensive.

Solution details

5G Network Technologies

5G is an abbreviation for 5th Generation mobile networks. This definition might be a bit misleading, because 5G networks provide not only mobile access, but also fixed wireless access. Even today mobile network operators provide fixed access via mobile LTE networks, inaccurately referred to as the 4th generation (4G) networks. Such connection is usually implemented by an LTE modem located in user’s home, or on a rooftop, being firmly associated with a specific address. Furthermore, the newly built overlay layer of mobile networks based on 3.7GHz frequency band ignores the mobility factor completely, focusing on fixed wireless access only. 5G networks will be completely converged, and the differentiation between fixed and mobile connections will no longer make sense.

Solution details
20
6
Do you wish to receive our newsletter? Yes, I am interested

Získejte

DOKUMENT ZA KONTAKT
popup





I give consent to the company VUMS Datacom, Ltd. based Lužná 591, 16000 Prague 6, ID: 48585611, registered in the Commercial Register of the Municipal Court in Prague, Section C, File 17811, to collect and process in accordance with law no. 101/2000 Coll. as amended, my name and e-mail address and other personal data provided for inclusion in the database in order to offer products, services and sending commercial messages by electronic means pursuant to applicable law no. 480/2004 Coll., on indefinitely until further notice.


Souhlasím se zařazením do databáze za účelem nabízení výrobků, služeb a zasílání obchodních sdělení prostřednictvím elektronických prostředků dle platného zákona č. 480/2004 Sb., a to na dobu neurčitou do odvolání.


Souhlasím se zasíláním newsletteru VUMS DataCom s informacemi, a to na dobu neurčitou do odvolání.