Cisco Duo, the multifactor authentication solution accessible to organizations of any size.
Find out more about F5 Advanced WAF, the solution that provides extensive protection of web applications
Find out more about SASE (Secure Access Service Edge) architecture, an alternative to traditional security approaches.
Find out how Splunk UBA (User Behavior Analytics) allows the elimination of unknown threats using advanced analysis technologies and Machine Learning.
Find out the main differentiators of Splunk Enterprise Security and what are the integration options.
The main competitive advantage of Cisco Cyber Vision is that it analyzes local direct traffic in network equipment.
Simplify working with an IT security architecture with Cisco SecureX
Get advanced malware protection through Cisco AMP-Cisco ACI integration.
Adopt security solutions with proven efficiency for employees working remotely.
Cisco Tetration – a product designed to meet current security needs.
Get better cybersecurity on your SD-WAN with Fortinet solutions.
Cisco Meraki simultaneously covers organizations’ WiFi infrastructure and cybersecurity requirements.
Protect your data and company applications with the help of Cisco Duo.
In Cyber Security, the lack of resources (people, skills, tools) is already acute, while external and internal attacks are increasing. For this reason, contracting cybersecurity services (Security as a Service) becomes the most practical choice for companies that want to ensure a high level of security. An annual study conducted by Cisco in Romania showed …
IT solutions and services provided by Datanet under the conditions of the COVID-19 epidemic (Apr. 2020)
Datanet Systems @F5 Solutions Day (March 2020)
The “Zero-Trust” Security Model, a new security approach for critical infrastructure protection
Datanet and Juniper present the new generation of smart products (nov. 2019)
The new IEEE 802.11ax standard represents a breath of fresh air for network administrators.
Datanet Systems specialists recommend a multilevel integrated approach to security.
The solution proposed by Datanet helps you guarantee the safety of the end customers.
Workshop dedicated to Cisco security solutions as well as SD-WAN technologies (Jan. 2019)
More than half of Web applications are constantly vulnerable to automatic attack methods. Datanet Systems
Datanet delivers an integrated security architecture, to cover all levels.
UTM Fortinet ensures a high level of security and a convenient price/sale rate.
Datanet presents the Cisco security benefits against information attacks
Datanet proposes the FireEye security solution
Encrypted traffic is a real security problem when the traditional firewall fails to respond to challenges. To prevent these situations, Datanet recommends integrating F5 SSL Orchestrator and Cisco Firepower solutions into a coherent advanced protection system.
User behavior is the main vulnerability in organizational protection. How can you protect your company?
In 2017, 84% of organizations have faced at least one Distributed Denial of Service attack. Have you ever calculated what damage you would suffer if you were facing such an attack? Do you know how to manage an attack of over 1 Gbps? Can you distinguish between a peak of legitimate traffic and a potential threat?
The increase in regulatory levels, multiplication and diversification of security risks force organizations to make extensive use of traffic encryption. But more and more hackers use encryption to camouflage their malware attacks and threats. Datanet can help you overcome this deadlock with the new Cisco ETA technology and make your investment in security solutions more profitable.
More than two-thirds of current security breaches are based on inefficient authentication systems and/or stolen passwords. (*) If you want to eliminate identity and access management issues and increase the level of protection of the entire organization, Datanet Systems offers the solution of a complete security architecture based on the Cisco ISE solution, over which applications from different vendors can be integrated.
Workshop about Cisco collaboration solutions (May 2017)
30% of servers hosted in data centers are „zombie” machines.
469 days is the time needed by organizations to detect an incident in their entire infrastructure.
Security alert: 90% of the web connected devices have weak spots