NAT Protection For Public server whether On-premise or Cloud, filters and blocks all malicious HTTP / HTTPS traffic directed to your servers and prevents unauthorized data disclosure. For this, we execute a set of policies that distinguish between malicious and safe traffic, through a Web Application Firewall – WAF.
Together with OWASP, a leading company in the defense against attacks on web applications, NAT Protection For Public server is responsible for protecting and preventing your company from the main attacks such as Broken Access Control, Cryptographic Failures, Insecure Design, Security Misconfiguration, Server- Side Request Forgery and any other known vulnerabilities.
NAT Protection For Public server complies with a set of application attack detection rules called ModSecurity Core Rule Set (CRS). This industry-leading set of rules is continually updated to protect against evolving online threats.
NAT Protection For Public server establishes protection measures to prevent external attacks such as Doxing, Distributed Denial of Service (DDoS), Phishing, SQL Injection, Whaling, Cross-site scripting, drive by download, among others. To do this, we apply different protection elements such as Firewall, IPS, IDS, ATP, VPN, Anti-DDos Systems, Sandbox, Double analysis engine executed by Kapersy and Avira, among others. In this way, we maintain high security standards for your company.
NAT Protection For Public server deploys different prevention engines like, Reverse Proxy Server, Deep Link Control, Directory Traversal Prevention, Cross-Site Scripting Protection, Cookie Digital Signature, Route Based Routing, Address Enforcement Engine website, among others. This in order to stop any attempt to violate your server.
NAT Protection For Public server has rules that the client can customize to the needs of their website. It also has access rules that block or allow specific IP addresses, guaranteeing security.
NAT Protection For Public server offers the possibility of keeping an eye on the access requests presented by your website, such as how people interact, what addresses have been blocked and what attacks the site has presented in a given period of time.
Automatic Updates
Defense against Trojan attacks
Defense against SQL injection attacks
Protection of public IPs
Request Limits
Installation and configuration in 20 minutes.
HTTP directives.
Outbound traffic analysis.
Attention through digital channels (Chat and Calls with a maximum wait of 1 minute)
30 minute SLA under contract
24 x 7 support, 365 days a year
New-Age Technology data centers are equipped with uninterruptible power supplies (UPS) and backup diesel generators, and are designed to ensure constant power availability for up to 48 hours during an indefinite power outage. In addition, there are redundant heating, ventilation, and air conditioning (HVAC) systems, networks, and UPSs. Physical security is ensured through the use of high fences, 24/7 security personnel, and video surveillance with 90-day archiving. To access it is necessary to pass a biometric scan of the geometry of the hand and present a proximity card.
We have never really had problems with service outages, however, to ensure Business Continuity for our clients, all our nodes are connected in an optical ring. The information is replicated to the next fastest responding DC in less than 15 minutes and everything continues as normal. We have our own nodes:
AMERICAS: Washington (USA), New York (USA), Chicago (USA), Metro Kanzas (USA).
EUROPE: Paris (France).
NETHERLANDS: Amsterdam.
GERMANY: Frankfurt am Main, Karlsruhe Subway, Munich.
To get to this answer, we must first mention that Backup tasks can be performed hot (business hours) or cold (non-business hours). Obviously it is more advisable to do it outside of working hours so that it does not consume the bandwidth that users are surely using. Anyway, if it is required to run the hot Backup, for example, because the Manager only works until noon and I need to backup his laptop before he leaves; In this case, we can assign a specific bandwidth to the task, thereby preventing upload consumption from being saturated (Email, Drive, online collaboration tools, etc.)
The data is stored encrypted in AES-256bits, which means that only the client with a username and password can access the information stored in our Cloud. You do not need to be physically on your LAN to manage your backups: the console is 100% Cloud. We have privacy and confidentiality clauses with their respective penalties in accordance with the data protection law (DLP).
© 2022, New-Age Technology Inc. All rights reserved
UN ASESOR COMERCIAL SE COMUNICARÁ A LA BREVEDAD CON USTED