Backup

With Backup Solutions tognet offers data protection at the highest level. Brightstor is the first data protection device on the market with perfect protection against all sorts of dangers and risks, thus reducing the costs of maintaining and maintaining your data backup. Open Agent also provides backup of even open files. The application of disaster recovery software allows you to recover your system in the shortest possible time in an emergency. Thus, the system combines the advantages of an automatic, reliable and theft-proof backup of your data while reducing user errors. With its available versions, Brightstor optimally adapts to the needs of your business.

Internet Security Data Security & Privacy

Data security In now in days, word has spread that information on a clay tablet is safest (shelf life 4,000 years). Unfortunately, the access to these data and the adaptation of the records is not that easy. So if you do not want to go back to the Tontafel, you have to protect your data, the networks and the connected PCs. Computer and communications structures today play an essential role in the conduct of business activities in organizations. Impairment or even failure of existing technical functions is associated with negative economic effects for affected companies. Modern technologies give unauthorized third parties new ways to access sensitive and confidential data. Even in such a case, economic damage threatens. We offer you the protection of Internet connections and communication via the Internet and Intranet. Our customers can draw on our expertise and many years of experience as a security service provider. We provide antivirus, firewall and intrusion detection systems. We design your public key infrastructure and virtual private networks ( VPNs ) with you and build them for you. We are happy to take over, look after and maintain your existing technology.

One server for all cases

Tognet Depending on the required performance and reliability, tognet offers several solutions for services such as file, database, terminal, fax, e-mail and backup servers. These range from stand-alone machines, where the same computer is responsible for all functions of data management and program execution, to the distribution of all functions across multiple computers for security and performance enhancement to sophisticated cluster solutions with server blades and storage subsystems that provide the necessary Offer potential for large amounts of data and different security aspects. High-performance server systems are specially designed for your needs. Proven stability and security are prerequisites for a server deployment in your network. Profitability and scalability are our strengths. We determine the optimal machine configuration for you (brand server from DELL, HP or Compaq, but also manufacturer-independent solutions) and deliver it at the best possible conditions complete with the corresponding installation service, including special services such as network connection, transfer of data from your legacy system etc. It expects a qualified consultation taking into account the specific features, the software to be installed on hardware and operating system. Our sales team will work with you to find a cost-effective individual solution. For daily updated prices simply contact us!

The right PC for your requirements

Workstation tognet offers different workstations. Our strength lies in fulfilling customer-specific requirements. According to the build to order principle (concept according to customer requirements), economical workstation computers are created with the special on-site service. We offer you individual interfaces and special requirements for housing or design. Alternatively, we also offer standard workstations from different manufacturers.

One server for all cases

Tognet Depending on the required performance and reliability, tognet offers several solutions for services such as file, database, terminal, fax, e-mail and backup servers. These range from stand-alone machines, where the same computer is responsible for all functions of data management and program execution, to the distribution of all functions across multiple computers for security and performance enhancement to sophisticated cluster solutions with server blades and storage subsystems that provide the necessary Offer potential for large amounts of data and different security aspects. High-performance server systems are specially designed for your needs. Proven stability and security are prerequisites for a server deployment in your network. Profitability and scalability are our strengths. We determine the optimal machine configuration for you (brand server from DELL, HP or Compaq, but also manufacturer-independent solutions) and deliver it at the best possible conditions complete with the corresponding installation service, including special services such as network connection, transfer of data from your legacy system etc. It expects a qualified consultation taking into account the specific features, the software to be installed on hardware and operating system. Our sales team will work with you to find a cost-effective individual solution. For daily updated prices simply contact us!

Networks

Tognet networks: The Foundation of Communication and Information Exchange Networks are the foundation of communication and information sharing. That's why networks are an important factor in your business success. Your company's network technologies must be able to perform their tasks smoothly, operate economically, and be adaptable to business changes at any time. In order to increase the availability and profitability, you need a competent IT partner. We not only know how to integrate these technologies cleanly into your IT environment, but also what solution is perfect for you. The IT infrastructure of many companies is characterized by heterogeneity and rapid growth. Tognet guarantees the high availability, scalability, ease of deployment, and smooth collaboration of the individual network components your company needs to build a reliable, flexible, and easy-to-manage IT infrastructure. Based on Windows, the company offers tognet tailor-made IT solutions with the highest security standards - from high-end servers to desktop systems for employees. Consultation: tognet advises its customers professionally in all matters relating to information technology in the company. Intensive advice on current customer-relevant developments and ways to increase efficiency and reduce costs through the use of the latest network technologies are standard. Commitment: Tognet carries out network services for the customer from standard solutions to customized special solutions to the implementation of a system architecture for the entire company network. Support: The support of the networks of medium-sized companies is an integral part of the service at tognet. With the tognet support concept, customers receive exactly the service they need and want.

Firewall

They use the internet for:
  • Research of valuable information
  • Communication by e-mail
  • Opening up new customer groups with e-commerce
But there are problems: Risk Internet
  • virus
  • So-called Trojan horses
  • hacker attacks
  • Misconduct in your own company
How much security does the Internet give you?
  • Security considerations did not play a major role in the development of the Internet
  • Effective protections are missing in major Internet services such as email or World Wide Web
  • Without the protection of the Internet connection, it is easy for professionals to spy on business secrets, bank account numbers or passwords
  • Manipulation of data in favor of the attacker
  • Technical or organizational weaknesses in EDP structures may favor this
It could be everyone! Even if nobody has a direct focus on your business, there are more risks! With approximately 130 million Internet users nobody can exclude that anyone uses his Internet knowledge as indiscriminately as criminally? and gets it to your address. Then you were lucky if the attacker? Only? for a few hours your EDP paralyzes. It could just as easily destroy current databases or change data unnoticed. How can I protect myself from that?
  • Experts agree: Effective protection only by so-called firewalls. Firewalls are Internet servers that are switched between the global Internet and your internal network (intranet).
  • Analysis of your traffic (Importance: High? Medium? Low)
  • Intensive verification of inbound and outbound traffic
  • Monitor your Internet connection day and night. Hackers do not know a closing time and no free weekend. This makes monitoring your Internet connection a full-time job
  • Danger source? Human? skip
  • Intensive and individual advice from a single source
Five steps to the optimal solution:
  1. Individual advice
  2. Sound security analysis. Together with you we analyze your security needs
  3. Development of an individual security strategy. We also use the know-how of our partners, leading firewall providers such as Bintec
  4. Realization Everything comes from a single source: hardware, software, operating and service concept of your firewall solution
  5. Permanent support We check and modernize your firewall at regular intervals.

Virus Protection:

What opportunities do you offer your employees What opportunities do you offer your employees?
  • Surfing the Internet Your employees are searching undisturbed in the worldwide data network for 'information'
  • Receive and send e-mail The communication in your company is increased by sending electronic mail.
  • Install programs at work Word or a new game is installed locally on the workstation.
  • Put files on the server
  • You store the file on a floppy disk sent to you on the server.
  • Can you imagine catching a virus while doing this?
  • We catch a virus?!?
Eleven percent more virus incidents than last year are reported by companies. Dramatic is the increase only in 'Trojan horses' - have more than doubled. What can happen with a virus attack?
  • Total data loss
  • Change of your data
  • Spying out your personal company data
  • Theft of passwords
  • Bug - etc ...
How can I protect myself from this? Not recommended actions: - Lock floppy disk drives and CD-ROM drives - Allow Internet access only for certain employees - etc. Recommended measures: - Secure eMail and Internet transfer - Secure server - Secure workstations - VIRUS PROTECTION SOLUTION!