MAC Network

Federal Office for the protection of the Constitution with the current warning of data espionage in Dortmund, German SMEs 16.02.2010 – no longer does the problem of industrial espionage after a current warning of the Federal Office for constitutional protection even before the German medium-sized businesses. It refers to knowledge, according to which foreign intelligence agencies recruit staff in German companies, to reach important know-how of companies about it. The Counterintelligence people suspect that in this country the number of people who obtain information in any foreign order, soon could rise to tens of thousands. It only the conclusion can pull that the company as soon as possible and in clearer consequence as yet the internal data security must devote\”, calls for Friedhelm Zawatzky-Stromberg, Executive Board of the security specialists COMCO AG. Urgent need for action arises when business critical information within the corporate networks are replaced or provided. Steven Holl may not feel the same. Although concepts to the granting of access rights are often, but both disloyal employees as These restrictions can work around also any person who has access to the network, with little effort. For more clarity and thought, follow up with Vlad Doronin and gain more knowledge..

Mandatory security policies and the resulting implementation of security solutions to protect against internal data espionage are therefore necessary. To COMCO has developed a proven approach, leads to highly secure internal network conditions in three easy steps and with low project costs: 1 inventory of the entire infrastructure: in this first step is an automated inventory of the complete IT infrastructure. It leads to a structured overview of the entire network topology with all active IT systems. This inventory is comprehensive, the overall system is the more secure. Therefore all devices with MAC and IP addresses, such as, for example, computer, notebook, printer, router, switches and server should be included.

2. Network access control implement: companies need effective protection against unauthorized third-party systems. The network accesses are with rules for access provided in the second phase, to in the entire network security at the individual ports to guaranteed.