Kerber Secure Server

To what degree do you value your business and company’s unique know-how? What is the average turnover of your company? To what extent are your money, privacy, and identity important for you? What would happen if you suddenly lost these valuable assets? Are you ready for it?

These are just a few questions you should ask yourself, because the majority of security incidents and risks are caused by not being prepared!

These risks can, to a large extent, be eliminated using a strong software tool developed to implement a security policy in an organization. The modules that form the Kerber Secure Server system will help you achieve the required state.

Kerber Secure Server modules:

HTTP filtering: Constitutes a transparent and configurable proxy server optimized for the SMB and public administration segments. It provides protection from malware, reduces the number of confidential information leaks, prevents access to undesired content and prevents undesired internet use. All data is saved to logs and provides an instant overview of where and when a particular user was on the internet and how much data he/she downloaded.

VPNs: VPN tunnel properties can be utilized, for example, for travelling businesspeople who need secure access to the company infrastructure from anywhere in the world. The transfer uses state-of-the-art encryption technologies.

Status firewall: Allows an administrator to control network communication or internet access. It allows access to its network services or activates their protection. The firewall serves as a checkpoint determining the rules of communication among networks. The system meets the most stringent security requirements while maintaining the flexibility and performance of the network.

Bandwidth Monitoring: Used especially when it is necessary to monitor and view the usage of the line used to connect to the internet. It offers an overview of the consumption of the line transmission capacity for each individual user accessing the internet.

IDS (Intrusion Detection System): A technique for revealing unauthorized or unusual activities in a computer system or network. An IDS module reveals network attacks on unsecured services, attacks on applications, unauthorized logins, access to sensitive data, as well as the presence of malware (viruses, Trojan horses, worms).





Other network services:

DHCP (Dynamic Host Control Protocol): This is one way of preventing the collision of IP addresses in the network. It also facilitates the configuration of client devices.

P2P blocking: Kerber includes a feature that successfully blocks so-called peer-to-peer communication, which is based on exchanging files among internet users.