arrow
IT Security
arrow Find out more

IT Security

Keeping data of a variety of entities in the commercial and non-commercial environment is one of the main challenges and, at the same time, advantages of functioning IT. We provide our clients with a high level of IT security. We provide ongoing protection against computer viruses, unauthorised data access, visual premise security, and more.

IT Security LAN and WLAN access control

Dynamic, centrally configured control of access to wired and wireless local networks represents the basic building block for securing data access in a computer network. Identification and subsequent access control is possible based on the device or user's identity. The solution is suitable for organisations of all sizes and fields that need device and user identification. Based on the authenticated identity, access to computer network resources will be ensured according to the defined rules. You will never again encounter a situation where, for example, somebody who has access to a data socket would be able to connect to a computer network.

HW SW One-time services Long-term services
HW servers (HPE, DELL EMC), disk storages (HPE, DELL EMC), virtual servers (vSphere, Hyper-V) ISE, FreeRadius, 802.1X support, or Captive Portal Design, installation, configuration, basic IT administrator training - Regular monthly inspections in the X hour range (inspections of logs, settings)
- Semi-annual SW, FW, HW updates, upgrades in the X hour range
- Monitoring of availability, statuses, etc.

 

IT Security Protection of the LAN perimeter

Protect against attacks on your local network. This solution is suitable for anyone who requires high-quality LAN security. Thanks to this security, there is no need to worry about the disruption of work and the financial loss resulting from data theft.

HW SW One-time services Long-term services
Firewall (Fortigate) part of the HW with the option to buy expanding properties later Design, installation, configuration, basic IT administrator training - Regular monthly inspections in the X hour range (inspections of logs, settings)
- Semi-annual SW, FW, HW updates, upgrades in the X hour range
- Monitoring of availability, statuses, etc.

 

IT Security Camera surveillance

Visual security of buildings, premises, server rooms, and provision of evidence will significantly reduce your security risk in any room. Camera systems not only discourage criminals, but also help clarify various events through the evidence provided.

HW SW One-time services Long-term services
Cameras (Axis), PC, server Central management of cameras and camera recordings (Milestone) Design, installation, configuration, basic IT administrator training - Regular monthly inspections in the X hour range (inspections of logs, settings)
- Semi-annual SW, FW, HW updates, upgrades in the X hour range
- Monitoring of availability, statuses, etc.

Contact us

Business hours

Mon-Fri:  8:00-16:00

The Company is registered in the Commercial Register maintained by the Regional Court in Brno, Section B, insert 6087

Billing information

UNIS COMPUTERS, a.s.
Jundrovská 31, 624 00 Brno
ID NUMBER: 63476223
Tax ID No.: CZ63476223

Billing information

Have a question?

Please contact us, we will be happy to advise you on your selection.

Your data is safe with us. Read our terms for personal data processing.

arrow