Share On Facebook
Share On Twitter
Share On Google Plus
Share On Linkdin

For the security of institutions

For the security of institutions

standard

Axitea addresses the Security Managers and the ICT Managers of the institutions, of which ministries, sanitary facilities, embassies, to support them in preventing them from dangers, reducing the risks and protecting the people, assets and information.

The origins of the risk can be caused by human action, natural events, and deficiency of installations: thefts, robberies, damages to raw material or finished products, structural damages to machineries or sabotage, unauthorized intrusions, espionage, seizures, vandalism, damage caused by street riots, extortions and assaults, fires, floods, explosions, storms and lightning, power failure (main cause of the deterioration of raw material and finished products).

The IT infrastructure is exposed daily to a series of threats able to compromise its availability, integrity, and privacy: exploits originating from the inside or outside the private network, automated attacks (flooding, scanning, mail bombing, etc.), attacks such as Denial of Service (for example, buffer overflow), spread of malicious code (virus, Trojan horses, worms, backdoors), intrinsic weaknesses of the systems and of the applications, configurations not adequately hardened, subtraction or diffusion of confidential data, organized attacks (for example, social engineering, phishing) represent concrete and daily threats, to which who is in charge of guaranteeing the security of the IT assets must necessarily consider.

Axitea offers solutions that contemplate systems for the reconstruction of events (for example video control and video surveillance), intrusion detection systems, gas and fire alarm systems, access and biometric control systems, alarm monitoring and intervention on alarm services, remote system monitoring, maintenance and technical assistance, guarding, secure access to IT network, dynamic protection of attacks on IT systems resources, management and profiling of network users, management of IT security.