They trusted us
How does SKK S.A. support the security of your network?
Ensuring network security is a constant challenge and an extremely important task of every organization. The applied security solutions should not affect the quality of the network, so its efficiency and performance, which translates into the effectiveness of the conducted activity. The choice of the appropriate solution is a multiway process which is started from analysing the existing status of the customer’s network by SKK S.A. specialists. This is the basis on which they specify the elements that require evident improvement within network security or their complete implementation. Next, they develop the solution design, configure security policies, install the system, verify its operation and, once the implementation is completed, they provide service support. It is worth adding that our proficiency relating to the implementation of networks within which many devices for automatic identification operate and exellent knowledge of those devices aids skilful formation of security policies also for them. The cooperation with leading global suppliers, i.e. Cisco, Aruba, Baracuda and Sonicwall, also contributes to implementations carried out professionally and completed successfully.
Solution types offered
Network Access Control (NAC)
Network Access Control (NAC) is a mandatory component of enterprises security system. NAC system is responsible for controlling end points before allowing them to access the company network. As a result of its operation, a given device may get access to the network or solely to selected resources or be blocked altogether. Access control is based on the 802.1X standard and the AAA structure, that is authentication, authorization and accounting. Authentication consists in verifying user identity using e.g. a login and password. Authorization determines scope of access to resources and scope of permitted activities. Accounting stands for registration of activities or attempt of user activities of in specific protection areas.
It is a tool securing computers, servers, and operating systems against hacking. It protects a reliable and controlled internal network against external access – public networks, the Internet, which are not trustworthy. It protects from unauthorised data leakage from the local network outside as well. The objectives are achieved by the firewall by filtering incoming and outgoing connections and, consequently, denying access requests considered dangerous. A firewall can be established by means of computer hardware, software, or thesetwo methods together.
In case of extended corporate network infrastructure, a hybrid model is usually used due to the security of numerous confidential data.