Advanced Security - Networking Project and Management - Turn-Key IT Management

IT Management

Advanced Security - Networking Project and Management - Turn-Key IT Management


Our IT management team analyzes the customers' needs, defines a network project, supplies all the IT material at the best price, maintains the system. It is mainly a turn-key approach. We take care of both the hardware lifecycle and the direct configuration of the system, based on consolidated policies. We have deep competence on advanced security, including perimetral protection, data security and preservation, geographical sites connections. We also take care of customers's personnel formation, if needed.

Advanced Security

Network Security

Unified threat management (UTM) is an emerging trend in the network security market. UTM appliances have evolved from traditional firewall products to a solution with many additional capabilities, including:

  • Spam blocker
  • Antivirus
  • Anti Spyware
  • Intrusion prevention
  • URL filtering
  • Application Control

Watchguard appliances used by Virtual are engineered to reduce cost, risk and complexity by integrating automated and dynamic security capabilities for comprehensive protection and maximum performance.
WatchGuard's Next-Generation Firewall (NGFW) advances the state of the art in security, manageability, and compatibility with real-world business environments. WatchGuard's NGFW products provide true line-speed security inspection on all traffic and support multi-gigabit packet filtering throughput. In addition, the NGFW line provides Application Control; connects offices via unique drag-and-drop VPN; connects people via SSL and IPSec VPN; and gives the enterprise unparalleled visibility into real-time and historical user, network, and security activities. With WatchGuard's NGFW, businesses can define, enforce, and audit strong security and acceptable use policies, resulting in increased employee productivity and less risk to critical intellectual property or customer data. A platform for network traffic inspection and network security policy enforcement, with the following minimum features:

  • Standard firewall capabilities: Packet filtering, network address translation (NAT), stateful protocol inspection, Virtual Private Networking
  • Integrated Network Intrusion Prevention (IPS)
  • Application Awareness and Control
  • Additional Intelligence: Directory integration to tie security policies to users and groups; cloud-based reputation services to stop traffic from dangerous sources
  • Real-time and historical visibility into user, network, and security activity

Watchguard Firewall's Application Control feature enables policy based monitoring, tracking, and blocking of over 1,800 unique web 2.0 and business applications.

Gain Control

  • Granular control over the most important applications like Facebook and popular instant messaging applications e.g. allow MSN instant messaging, but disallow file transfer over MSN IM
  • Control and report on over 1,800 web and business applications, using over 2500 unique signatures
  • Control and report on usage of applications by user, group, and time of day.

Controlling Your Security through effective patch management

Virtual takes patch management seriously: your network will be as updated as possible and consequently your system protected, no matter what changes occur in your environment. The highest risk for business security comes through unpatched software, be it the operating system itself or the software installed on it. Patch management plays a major part in your defence against internal and external threats to business.

An effective patch-management strategy allows you to manage security threats proactively by automating the collection, analysis and delivery of security patches throughout the enterprise. Automating this time-consuming process can significantly decrease the costs of security maintenance to protect your company from worms, viruses and other malicious threats.

Antivirus

Posting corporate policies or sending out blast e-mails does not achieve desired result: there is always one employee who never pays attention to the warnings and probably does not understand the importance of updating anti-virus software. This one clueless user, or just the fear that one may exist in the enterprise, can cost IT departments thousands of Euros. The situation forces IT managers to update anti-virus software directly in every machine.

Nevertheless the new trend is to strengthen central management of anti-virus: specific tools make the software install automatically and check which is the latest update of every user.

In addition, managers can schedule enterprisewide sweeps for viruses or target a specific machine, even removing icons from desktops, hiding the anti-virus software from the user's eyes.

Certification: Symantec registered partner

Network Design, Management and Support

Local-area networks (LANs) make up the backbone of your network. They can be either an enabler or a hindrance to business, depending on their implementation. Virtual delivers sensible LANs which fit your environment and requirements, integrating effectively with your other networks, whether wireless or wide-area networks (WANs).

We can design, build, implement and manage (if required) your whole LAN infrastructure. This will give you a network which performs to and beyond your expectations.

WiFI and Mesh technology are the solution in particular situations where some mobile peripheral devices have to connect to the network, sending and receiving data. Mesh networking is a way to route data, voice and instructions between nodes. It allows continuous connections and reconfigurations around broken or blocked paths, "hopping" from node to node until the destination is reached, making the network very resistant.

Our specialized human resources are skilled to detect the current "status-of-the-art" of Network Infrastructure to work out an optimized solution as per our customer requirements and Business Continuity needs. The development of new project will consider technological action (providing equipment), operating procedure (Network & Security Management) or third party services acquisition consulting (Project Auditing & Management)

Turn-Key IT Management

Datacenter

A data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression), and special security devices.
Virtual offers industry-leading education for IT professional, facilities managers, engineers, designers, consultants, and anyone involved in the critical decisions and infrastructure planning of data centers worldwide.
The changing nature of data centers makes it more and more critical for employees to be updated on the current theories and best practices for issues around topics of: power, cooling, management, security, and planning.

Microsoft Active Directory

An active directory manages a variety of functions including the ability to provide information on objects, helps to organize these objects for easy retrieval and access, allows the access of end users and administrators and allows the administrator to set security up for the directory.
Active Directory helps small and medium size organizations with a reliable working environment for the end-users, which offers the highest levels of reliability and performance. In this way, users will work more efficiently, the environment will be more secure and manageable and the task of the IT staff will be easier.

E-Mail Antivirus & Antispam

Virtual offers two possible solutions to protect your email address. The first solution is an outsourcing one, the second is a hardware platform to be installed in the client's office or on a dedicated server in Virtual's own data center.

Online Protection
Online protection is aimed at small business or all those business without IT personnel. Email filtering is managed by one of Virtual's server cluster, devoted solely to email security.

OnSite Protection
OnSite protection is based on a hardware appliance where ALT-N's MDaemon software is installed. This solution is mainly profitable for bigger companies, thanks to the possibility to customize the intervention on emails, the whitelists and blacklists and the interface with the company's email server through LDAP or active directory

HW & SW Supply

Virtual can supply your business with all its hardware and software at extremely competitive prices. Whether this is a single ink cartridge or 100 PCs, Virtual will provide you with guidance and advice on buying the products that will best suit your needs.
Purchasing your hardware and software from Virtual will ensure that you buy the right products at the right prices.
All hardware and software purchased from Virtual can be installed on site, teaching you how to use any new purchased application, if required.
For high demand production needs we can deliver hardware with industrial features like high-performance fans, shock mounting on the drives, air filters, lockable doors. The pc are projected and produced to tolerate critical work conditions and guarantee reliability and continuity.
Our supplier for this type of hardware is ASEM .

Certification: Acer active partner - HP Business partner - Watchguard reseller - Symantec Reseller - ALT-N reseller - Microsoft partner

Data Backup system

Backup warrants to have copies of the requested data that may be used to restore them in case of a data loss event.
All sites of our customers have their own backup system. We use two main storage media type:

  • Magnetic tape
  • Hard disk

Both this solutions are reliable: to decide what is the best one for our customer, we need to analyze the type and the quantity of the data to save. To manage backup on hard disk, Virtual uses Microsoft Data Protection Manager software: data are saved on external hard disks. It is possible to have several backups every day, reducing drastically the danger of losing data, assuring the chance to restore them. Data can be preserved for months or years according to customer's needs.