Safe storage of large amounts of data - one event in two scenes

In October and November 2019, we organize a series of 2 meetings in Poznań devoted to NetApp technologies. During the first one, we will review mass memory technologies, while the second training session will allow participants to become familiar with the administration of the ONTAP system that manages NetApp arrays.

The events are addressed to companies and organizations that face the necessity to store large amounts of data in their activities, and at the same time, due to their nature and related requirements, must protect them against loss, which in the case of a large data size is not a trivial task.

We invite employees of cadastral offices, universities, companies storing archival data and scans, servicing large monitoring systems and others.

1. Overview of NetApp technologies - replication and backup combined with a live show - October 15, 2019. The agenda covers the following two topics:

  • Safe and fast on NetApp All-Flash solutions - building a SAN network,
  • Live demonstration of Array Replication and NetApp SnapCenter solutions
    (fast and universal data backup between NetApp arrays).

2. Training in the basics of administration and use of the ONTAP system - November 14, 2019. The second part of the training will include:

  • Basic ONTAP configuration,
  • Network configuration in ONTAP,
  • CIFS protocol configuration,
  • Space management in the ONTAP system.

If you are interested in taking part in our double training, please see agenda and registration using forms on our website.

See you later?

Report from the business breakfast "EXTREME AUTOMATED CAMPUS - BUILDING A SAFE AND EFFICIENT LAN NETWORKS" - June 13, 2019

The substantive level of our meeting (EXTREME AUTOMATED CAMPUS - BUILDING A SAFE AND EFFICIENT LAN NETWORKS) was highly rated by the participants. Some of the companies are interested in implementing a standards-based solution Extreme Automated Campus. For this reason, we plan to organize an Extreme Fabric configuration workshop after the summer holidays. We kindly ask interested persons to declare their participation.

Śniadanie biznesowe Extreme Automated Fabric

We invite you to read the presentations on Extreme Networks technology that you watched at our meeting:

We would like to thank everyone present for their time. We hope that it was not a waste of time for you and we will meet to discuss the implementation of a network based on Extreme Automated Fabric: o) Please contact us.

Another seminars after the holidays! See you soon!

In a few days our "Extreme Automated Campus" seminar!

As we wrote earlier, our company organizes a meeting devoted to building large and efficient LAN networks. It's in a few days, i.e. June 13!

Brief characteristics of the Extreme Automated Fabric solution:

- efficient fabric backbone in mesh topology creates a structure that ensures:
   - redundancy - automatic reconfiguration after a link or device failure,
   - load balancing - all connections are active and are created in a way that ensures even load of devices and ports,
- access switches are configured automatically thanks to Fabric Attach functionality,
- Extreme Management Center (XMC) and NAC (Extreme Control) management software support the administration and reconfiguration of the network, and ensure the security of IT resources.

Extreme Automated Fabric

More details in agenda. If interested, please register with form on our website.

We also invite you to read the presentations showing the use of Extreme Networks solutions in healthcare:
– Network infrastructure as the key to improving the quality of medical services - business presentation,
– Extreme Solutions for Healthcare - technical presentation.

We invite!

Palo Alto Networks - a weapon in the fight against new threats

The catalog of threats that IT system administrators have to take into account has changed significantly in recent years. Attack vectors, against which up to a point could be protected using traditional firewall and anti-virus protection of workstations, have undergone a significant transformation. Criminals quite quickly learned to bypass traditional security measures and developed techniques thanks to which the hijacking and surveillance of an IT system often takes place unnoticed. APT (Advanced Persistent Threat) threats have become very real. Known and high-profile attacks of this type are sometimes detected after months, and sometimes years, when criminals have already extracted all the data from the systems.

Defending against this type of threat using traditional tools is little that ineffective, it creates a false sense of security, which allows intruders to conduct their activities with complete freedom. The lack of appropriate alerts from security systems means that everyone seems to be safe and there is no need to look at it closely. Most serious security incidents happen not in security-deficient environments, but in security-defective environments. Often, as part of handling a security incident, new tools are launched that immediately detect a whole range of threats and generate a large number of alerts, while traditional antivirus systems and firewalls present in the network do not see anything.

Continue ...

How to avoid cybercriminals? - UpGreat training at WZP "Lewiatan"

On May 28 this year. The Wielkopolska Association of Employers Lewiatan invites you to a training entitled "How to avoid cybercriminals?" run by our IT security specialist.

 The training will cover the following issues:

  1. Where is the growing popularity of computer crimes coming from?
  2. Why are the rank and file of the organization the most frequent target of attacks?
  3. What are social engineering techniques and why are they effective and popular?
  4. Examples of social engineering attacks.
  5. Effects of cybercriminals' actions on individuals and organizations.
  6. Security incidents and legal regulations.
  7. What preventive measures should be implemented in the organization?

At the end of the presentation, a link to a more detailed study on security policies and risk analysis will be provided.

Training date: May 28, hours. 16.00–18.30.
Place of training: Wielkopolski Związek Pracatorów Lewiatan, ul. Grunwaldzka 104, local 216, 2nd floor

Registration for members of the Association at the address asystent@wzp.org.pl

We invite!

Report from the meeting dedicated to PaloAlto Networks technologies on April 11, 2019

On April 11, another of our meetings devoted to IT technologies took place. This time, the topic of the business breakfast was security for PaloAlto Networks networks and workstations. The title of the lecture is "PROTECTION AGAINST CYBER CRIME - PALO ALTO NETWORKS SAFETY SOLUTIONS".

O firmie UpGreat - Piotr Flis
NGFW & TRAPS - Marcin Szewczuk

In a relaxed atmosphere, we talked about next-generation firewalls (NGFW) and securing workstations using TRAPS software.

There are presentations at the following links:

Thank you for your presence and we invite you back. Next meeting on June 13 this year. will be devoted to building campus networks with Extreme Networks.

How to build a safe and efficient network with Extreme Automated Campus?

On Thursday, June 13 this year. in Concordia Design a business breakfast devoted to technology will take place in Poznań Automated Campus by Extreme Networks.

In a pleasant atmosphere of breakfast, we will discuss various aspects of building efficient and fault-tolerant LAN networks using the fabric structure:

  • What is Automated Campus,
  • Load balancing and fault tolerance issues in LAN networks,
  • Network management with Extreme Management Center,
  • Network access control using NAC (Extreme Control),
  • Network traffic analysis from Extreme Analitics.

 Information on the meeting agenda can be found here here. Please register using form on our websitej.

Securing your network with Palo Alto Networks solutions

On Thursday, April 11 this year. in Concordia Design a business breakfast devoted to network security by Palo Alto Networks will take place in Poznań.

During the meeting, we will discuss Palo Alto Networks technologies, in particular:

  • next-generation firewalls (NGFW) operating on the application layer,
  • protection of workstations using TRAPS software,
  • operation of the WildFire cloud service,
  • Thread Prevention protection,
  • filtering network traffic,
  • reporting on network traffic.

 Information on the meeting agenda can be found here here. Please register using form on our websitej.

Are we threatened by cyber attacks?

Cybersecurity, hackers, threats and vulnerabilities have been talked about more and more recently. The entry into force of the provisions of the GDPR caused the first wave of increased interest in the issues of risk analysis, vulnerability identification and risk minimization. Almost a year has passed since then, and security still seems to be one of the most popular issues in the IT industry. At the end of last year, another wave of interest aroused the so-called "Cyber Act", i.e. the Act on the National Cybersecurity System. Although it does not arouse such emotions as the GDPR, because it covers only providers of critical services from the point of view of the state, it is one of the hottest topics in the sectors of the economy related to energy, transport or health protection. It is also worth recalling that since 2015, the public finance sector is still covered by the regulation on the National Interoperability Framework, in which a fairly large fragment has also been devoted to security issues.

All the above-mentioned regulations refer to the need to implement information security management systems, the task of which is to identify vulnerabilities and threats, analyze the risks associated with them and implement action plans aimed at minimizing this risk to an acceptable level.

Is the threat of attacks by cyber criminals or cyber terrorists really that serious? Unfortunately, everything indicates that it is. Already some time ago, NATO recognized cyberspace as one of the areas of combat operations that it must defend Continue ...

What is hyperconvergence and for whom?

On Thursday, January 31 this year. in Mous Bar A business breakfast devoted to hyper-converged solutions will be held on the 15th floor of the Bałtyk office building in Poznań.

In a relaxed atmosphere with a view of the whole of Poznań, we will discuss various aspects of the implementation of flexible solutions for data centers on the example of HPE Simplivity:

  • Overview of the concept of hyperconvergence,
  • Solution - physical platform, functionalities,
  • Technical issues of SimpliVity,
  • SimpliVity in terms of business and examples of applications.

 Information on the meeting agenda can be found here here. Please register using form on our websitej.

You can read more about HPE SimpliVity here.