{"id":4939,"date":"2024-02-13T11:00:42","date_gmt":"2024-02-13T09:00:42","guid":{"rendered":"https:\/\/it-integrator.ua\/platforms\/tier-1-partial\/"},"modified":"2024-03-12T11:14:42","modified_gmt":"2024-03-12T09:14:42","slug":"tier-1-partial","status":"publish","type":"platforms","link":"https:\/\/it-integrator.ua\/en\/platforms\/tier-1-partial\/","title":{"rendered":"Tier 1: Partial"},"content":{"rendered":"<h6><span style=\"color: #a30404;\"><strong>1. Next Generation Firewall, NGFW<\/strong><\/span><\/h6>\n<p><span style=\"color: #a30404;\">Purpose:<\/span> Corporate firewall<\/p>\n<ul>\n<li>&#8220;classic&#8221; functions (NAT \/ ACL \/ IPS \/ QoS \/ VPN, etc.)<\/li>\n<li>in-depth control and filtering of packets (up to the level of Deep Packet Inspection)<\/li>\n<li>identification of applications and granular configuration of network policies for them<\/li>\n<li>URL filtering and malware detection based on reputation databases<\/li>\n<li>inspection of SSL traffic<\/li>\n<\/ul>\n<h6><span style=\"color: #a30404;\"><strong>2. Endpoint Protection, EPP<\/strong><\/span><\/h6>\n<p><strong><span style=\"color: #a30404;\">Purpose:<\/span><\/strong> Basic mandatory (initial) component of any cyber security system:<\/p>\n<ul>\n<li>signature antivirus with a centralized management console<\/li>\n<li>Device Control \u2013 control of removable media<\/li>\n<li>Application Control \u2013 blocking the launch of programs on the &#8220;black&#8221; list<\/li>\n<li>Host IDS\/IPS is an extension of functionality built into the OS<\/li>\n<\/ul>\n<h6><span style=\"color: #a30404;\"><strong>3. Multifactor Authentication, MFA<\/strong><\/span><\/h6>\n<p><strong><span style=\"color: #a30404;\">Purpose:<\/span><\/strong> Comprehensive anti-fraud and enhanced authentication system:<\/p>\n<ul>\n<li>universal authentication server with the possibility of integration with any environment (without restrictions)<\/li>\n<li>the world&#8217;s broadest set of factors affecting mobile identification (geolocation, root\/jalibraek, physical device identifiers, etc.) and enabling authentication (any biometric sensors, background behavioral gyro tracking, touch screen tap patterns, etc.)<\/li>\n<li>technology for protecting third-party mobile (for example, banking) applications without the need for integration into the applications themselves, by creating an external &#8220;layer&#8221; of control and ensuring application security<\/li>\n<li>background behavioral analysis of user sessions and prevention of fraudulent transactions<\/li>\n<li>deep permanent analytics to reduce the risks of fraud and improve the quality of user service (for example, bank customers)<\/li>\n<\/ul>\n<h6><span style=\"color: #a30404;\"><strong>4. Asset &amp; Patch Management<\/strong><\/span><\/h6>\n<p><strong><span style=\"color: #a30404;\">Purpose:<\/span><\/strong> A comprehensive toolkit for building a basic centralized IT infrastructure monitoring system:<\/p>\n<ul>\n<li>Asset Management (identification of network assets, maintaining a single database of information resources)<\/li>\n<li>Patch Management (management of OS and software updates)<\/li>\n<li>Network Monitoring (monitoring the functionality of devices, ports, monitoring the serviceability and availability of channels, etc.)<\/li>\n<li>Server Monitoring (control of the &#8220;health&#8221; of servers, applications, databases, hypervisors, etc.)<\/li>\n<\/ul>\n<h6><span style=\"color: #a30404;\"><strong>5. Backup &amp; Restore<\/strong><\/span><\/h6>\n<p><strong><span style=\"color: #a30404;\">Purpose:<\/span><\/strong> Automated centralized IMS for any virtualization environments, SZD, DB, applications, clouds:<\/p>\n<ul>\n<li>creating, testing and restoring data backups in different modes (Full backup, Incremental backup, Differential backup)<\/li>\n<li>support for various architectures and storage environments (P2P \/ P2V \/ D2D \/ D2D2T)<\/li>\n<li>the ability to create database backups without stopping them<\/li>\n<li>deduplication, encryption, geographically remote storage<\/li>\n<li>compliance with established RTO \/ RPO indicators<\/li>\n<\/ul>\n","protected":false},"featured_media":0,"template":"","class_list":["post-4939","platforms","type-platforms","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/it-integrator.ua\/en\/wp-json\/wp\/v2\/platforms\/4939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-integrator.ua\/en\/wp-json\/wp\/v2\/platforms"}],"about":[{"href":"https:\/\/it-integrator.ua\/en\/wp-json\/wp\/v2\/types\/platforms"}],"wp:attachment":[{"href":"https:\/\/it-integrator.ua\/en\/wp-json\/wp\/v2\/media?parent=4939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}