Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
Please reach us at servicedesk@rsan.co.za if you cannot find an answer to your question.
We specialise in creating network and server infrastructure (hardware and software) that is robust, stable, reliable and dependable.
We do not service consumers, such as home users. We do not offer web design, programming or VOIP and Telephony.
A Firewall helps control network traffic… think of a gatekeeper controlling who passes through. It protects against hacking.
Absolutely! Fortinet offers the best firewall at the best cost/Mbyte of protected traffic.
Most of our customers use Fortigate. The other wish they did. Many are government departments and municipalities. Several TVET colleges and schools. Most internet service providers. I use a small one at home!
The best option is to install FortiClient. FortiClient enables you to perform web filtering, network protection, anti-virus and vulnerability scans of these devices when they are at home or on the road AS IF they were safely behind a corporate firewall.
Cloud backup does not have to be expensive. Azure, AWS and Google Cloud can add up very quickly. There are more cost-effective options for small to medium sized backups.
Three layers of power can help. For perfect quality power for sensitive and expensive equipment, use a UPS (Uninterruptible Power Supply). For slightly longer (2-4 hours) runtime use an Inverter. Both UPS and Inverter run on batteries. UPSs are typically more expensive for the same runtime because of their higher quality output. Finally, a Diesel/Petrol generator can produce lots of power and run for longer periods of time. We don’t do generators but can greatly assist you with Inverters and UPSs.
This is the most exciting part – give us a call or email, and we’ll show you!
As a teaser, I'll tell you that we use the 3-2-1-0 rule. Three copies of your data on two different kinds of storage, one of them off-site, and zero errors during regular restore testing.
I'll tell you that we like cloud storage (to get your backup data off-site.) We like immutable backups; even the internet service provider hosting your data can't delete it. Even YOU can't delete it. Which means that even a hacker with your password can't delete it. Until the backup period is over.
I'll tell you that the backup software we prefer can do automatic testing of backups to confirm recoverability.
Network vulnerability scan means that we use a software program to run an automated test on your network devices. Anything attached to the network. This can be laptops and desktops, servers, routers and switches, VoIP phones, multifunction machines like printer/scanner devices, biometric sensors like fingerprint readers, WiFi access points and many more. In fact, you'll be surprised how many devices are active on your network.
The scan will look for common ways to break into systems. It will identify "unpatched" software/firmware, meaning software that has bugs or flaws that have not yet been fixed as they exist on your network. It will pick up any "holes" that haven't been closed.
Similar to inspecting your house for weak points, like missing burglar proofing or open doors.
Network penetration "pen" testing is a more active technique for identifying weaknesses on your network. For example, with penetration testing we will use software programs to try to get into systems by exploiting (using) their vulnerabilities.
This is similar to trying to break into your house to validate whether the security measures in place are good enough. Does the alarm work, are the burglar bar secure, can we force a window open, or get in through the roof.
No, we will not damage anything on your system; we will not exfiltrate (steal) any of your sensitive information. :)