Finewall

Vitelek specializes in providing the most optimal and effective security solutions to help you secure your customers' data sources, limiting unwanted intrusion into the system. Help you control all the flow of input and output traffic, protect your system from being infiltrated by bad guys to steal data.

System Introduction

Hackers are getting better and better, while networks are still slow to deal with their vulnerabilities and Firewalls are known to be the first line of defense for businesses. Vitelek has a mission to help enterprise companies build the best security system to prevent attacks by bad guys to steal information.

Firewall divided into 2 main:

  • Personal Firewall

  • * Firewalls are installed suitable for individual users to protect a computer against attacks and unauthorized access from the outside. In fact, the firewall for individual users is also integrated with many other features such as monitoring anti-virus software, anti-intrusion software, etc. to optimize the efficiency for a simple configuration of a computer. Single.
  • Network Firewall

  • * Firewalls for networked systems are designed to protect hosts in the network against outside attacks. In contrast to the Personal Firewall that only protects one computer, the Network Firewall must ensure the safety and security of the entire computer network. In particular, a Network system should have the following main parts:
  • - Packet Filtering Router (Packet-Filtering Router).
  • - Application Gateway (Application-Level Gateway or Proxy Server).
  • - Circuit Gate (Circuit Level Gateway).

Optimum security system

Firewall functions and tasks

Between the intranet space and the internet, a firewall is set up to control the flow of information data that is exchanged. From there, the firewall assumes the following specific functions and tasks:

* Firewall Functions

  • - Enable or disable applications that access the outside or from the outside to the internal system.
  • - Detect and prevent external attacks.
  • - Control access from users (prohibited or allowed).
  • - Manage and control network data flow.
  • - Verify access.
  • - Support to control the content of information and packets circulating on the network.
  • - Filter packets based on source address, destination address and port number, network protocol.
  • - Firewall acts as an intermediary proxy.
  • - Protect system resources from security threats.

Optimum security system

* Firewall's mission

  • - PROTECTION: Important data in the internal network and system resources are targeted by hackers. Thus, the firewall protects information from unauthorized access or data theft.
  • - DEFENSE: In addition to protecting the information inside the system, the firewall also kicks in the defense against attacks from the outside. For example, detecting and preventing intrusions when hackers use programs that can detect information to detect security errors on the system, detect administrator accounts and passwords.

The importance of firewalls

If your computer is not protected, when connected to the Internet, all traffic in and out of the network is allowed, so hackers, trojans, viruses can access and steal your personal information on your computer. count. They can install code to attack data files on the computer. They can use your computer to attack another home or business computer connected to the Internet. A firewall can help you get rid of malicious packets before it reaches your system.

  • - Port control makes it possible for the Firewall to only allow certain types of connections to enter the local network. It should also be noted that because the inspection is based on the header of the packet, the filter has no control over the information content of the packet. Passed packets can still carry actions with the intention of stealing information or destroying bad guys.
  • - Today, the level of hackers is getting better and better, while networks are still slow to handle vulnerabilities. This requires the network administrator to have good knowledge of network security to be able to keep the system's information safe.
  • - For individual users, they cannot know all the tricks to build themselves a Firewall, but they should also clearly understand the importance of information security for each individual, thereby self-learning to know a firewall. Some ways to avoid simple attacks of hackers.

Optimum security system

Contact

Contact us here.