loader image
LOGO

ANALYZE ALL QUERIES TO YOUR SERVER OR APPLICATION

Web Application Firewall (WAF) that helps protect your website from attacks that can affect security and consume resources from your servers, putting them out of service. Your sites will be protected from SQL Injection, Xss and crossscripting attacks, among others.

PROTECTION IN REAL TIME

NAT PROTECTION FOR PUBLIC SERVER, whether On-premise or Cloud, filters and blocks all malicious HTTP / HTTPS traffic going to your servers and prevents unauthorized data disclosure. For this, we execute a set of policies that distinguish between malicious and safe traffic, through a Web Application Firewall – WAF.

INTEGRATION WITH OWASP

In conjunction with OWASP, a leading company in the defense against attacks on web applications, NAT PROTECTION FOR PUBLIC SERVER is in charge of protecting and preventing your company from the main attacks such as Broken Access Control, Cryptographic Failures, Insecure Design, Security Misconfiguration, Server- Side Request Forgery and any other known vulnerabilities.

COMMITTED TO YOUR SAFETY

NAT PROTECTION FOR PUBLIC SERVER  complies with a set of application attack detection rules called ModSecurity Core Rule Set (CRS). This industry-leading rule set is continually updated to protect against evolving online threats.

PERIMETER SECURITY

NAT PROTECTION FOR PUBLIC SERVER establishes protection measures to prevent external attacks such as Doxing, Distributed Denial of Service (DDoS), Phishing, SQL Injection, Whaling, Cross-site scripting, drive by download, among others. To do this, we apply different protection elements such as Firewall, IPS, IDS, ATP, Anti-DDos Systems, Sandbox, Double engine analysis executed by Kapersy and Avira, among others. In this way, we maintain high security standards for your company.

ADVANCED PROTECTION

NAT PROTECTION FOR PUBLIC SERVER deploys different prevention engines such as, Reverse Proxy Server, Deep Link Control, Directory Traversal Prevention, Cross-Site Script Protection, Cookie Digital Signature, Route-Based Routing, Address Enforcement Engine website, among others. This in order to stop any attempt to violate your server.

CUSTOM RULES

NAT PROTECTION FOR PUBLIC SERVER has rules that the client can customize to the needs of their website. It also has access rules that block or allow specific IP addresses, guaranteeing security.

RECORDS AND REPORTS

NAT PROTECTION FOR PUBLIC SERVER offers the possibility of keeping an eye on the access requests that your website presents, how people interact, which addresses have been blocked and which attacks the site has presented in a certain period of time.

FREQUENTLY ASKED QUESTIONS, ANSWERS FAST

New-Age Technology data centers are equipped with backup uninterruptible power supplies (UPS) and diesel generators, and are designed to ensure constant power availability for up to 48 hours during an indefinite power outage. In addition, there are redundant heating, ventilation and air conditioning (HVAC) systems, networks and UPS. Physical security is ensured through the use of high fences, 24/7 security personnel, and video surveillance with 90-day archiving. To access it is necessary to pass a biometric scan of the geometry of the hand and present a proximity card.

We have never really had problems with service outages, however, to ensure the Business Continuity of our clients, all our nodes are connected in an optical ring. The information is replicated to the next fastest responding DC in less than 15 minutes and everything continues as normal. We have our own nodes:AMÉRICAS: Washington (USA), New York (USA), Chicago (USA), Metro Kanzas (USA).
EUROPA: París (France).
PAISES BAJOS: Amsterdam.
ALEMANIA: Frankfurt am Main, Metro Karlsruhe , Munich.

To arrive at this answer, we must first mention that Backup tasks can be performed hot (working hours) or cold (non-working hours). Obviously it is more advisable to do it outside working hours so that it does not consume the bandwidth that users are surely using. In any case, if it is required to run the Backup hot, for example, because the Manager only works until noon and I need to backup his laptop before he leaves; In this case, we can assign a specific bandwidth to the task, thus avoiding saturated upload consumption (Post, Drive, online collaboration tools, etc.)

The data is stored encrypted in AES-256bits, which means that only the client with a username and password can access the information stored in our Cloud. You don’t need to be physically on your LAN to manage your backups: the console is 100% Cloud. We have privacy and confidentiality clauses with their respective penalties in accordance with the data protection law (DLP).

STRATEGIC PARTNERS
OF INTERNATIONAL BRANDS

FOLLOW US ON:

NEW-AGE TECHNOLOGY
IN THE WORLD

© 2022, New-Age Technology Inc. All rights reserved

contact us

Our commercial advisors will contact you shortly.

STRATEGIC PARTNERS OF INTERNATIONAL BRANDS

tE CONTACTAMOS A LA BREVEDAD

contáctanos

Nuestros asesores comerciales se comunicaran con usted a la brevedad.

SOCIOS ESTRATÉGICOS DE MARCAS INTERNACIONALES

GRACIAS POR REGISTRARSE

UN ASESOR COMERCIAL SE COMUNICARÁ A LA BREVEDAD CON USTED