Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Hall 7 / Booth Number 7-105

DataNetwork / IT-Infrastruktur

Categories

Intrusion detection / prevention IT service management Log management Penetration tests Risk analysis and management Vulnerability and patch management Security management Security test suite SIEM Security information and event management APT protection Anti-spam solutions Counter-intelligence Systems management Unified threat management (UTM) / security appliances Anti-virus and malware protection High availability Backup solutions Endpoint security Cyber-physical systems security Mobile device managment Mobile security Network security Physical IT-security Interface protection / Device management Server-based computing Storage solutions VoIP security Web application security Asset management / IT documentation Data center security Bandwidth management Big data Security Cloud (computing) security Content security Email security Threat analysis Business continuity Compliance / GRC (products and services) Remote access (VPN) Awareness Auditing Education / training / qualification Virtualization Certification of products and services Consulting IT security Forensics ISMS (ISO-IEC 2700x / BS 7799) BSI IT baseline protection Managed security services Planning of data centers and IT infrastructures Testing laboratory / consultation Network access control (NAC) License management Identity and access management Electronic signatures Computer emergency response team (CERT) Denial of service protection Firewalls Archiving / Long-term storage Data leakage / loss prevention Data deletion Data recovery Hardware security Data protection, data security Authentication Single sign-on Access protection Admission control User (rights) management Biometrics Digital / Enterprise Rights Management (DRM/ERM) Document management Application security

Key Facts

  • Hybrid Datascenter
  • IT-Operating
  • IT Security

Product Description

The corporate network must run continuously and meet the highest performance requirements - in other words, it must be high-performance and highly available. Functionality and security are important aspects here. Smooth and secure processes are essential for business success. Whether e-mail, telephony or SAP - the network has now become the basis for all critical IT systems. As a system house, planner and operator, we bundle a multitude of competences in the area of data networks for our customers. Our system specialists know the network across all OSI layers and can offer you support in installation, troubleshooting and operation from the cable to the application.

 

As an IT infrastructure service provider, we prove our efficiency day after day with our own network operation, data center services and projects at our customers' sites. Our portfolio is based on ITIL-compliant processes and thus guarantees you the greatest possible transparency. And our migration concepts allow for the uninterrupted further development of the established infrastructure - towards a powerful and secure corporate network. In doing so, we always keep an eye on the operating expenses: from our own experience.

... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.