Main menu
Consulting
Free Software
Consulting
Business Intelligence
Consulting
Project & Risk Management
Consulting
ERP
Consulting
ICT Asset Metering
Consulting
PLM & PDM
ICT
Consulting
ICT
Application Development
ICT
Networking
ICT
App Mobile
ICT
Web Application
ICT
Support
Engineering
Project & Product
Engineering
Design 3D
Engineering
Technical Data Management
Academy
Project Management
Academy
ICT
Academy
Engineering
Academy
Marketing
Academy
Administration
Academy
Human Resources

Networking

 

Crucial sector of the modern information technology, networking, is the discipline concerned with the interaction between computers and/or general devices by creating interconnected networks and communication with a common language.

The company's infrastructure has now become an added value to be managed in a structured and organic since its foundation, by creating targeted solutions for all business types, from simple business to large enterprises. Recent market research, in fact, show that have a computer network adeguate to the needs of society, not only allows you to share critical business data across several functional areas, but also improves individual productivity of each employee. In addition the business relations between different business partners are completed in full compliance with high safety standards with a consequent optimization of investments.

PJM will then offer you to choose the type of network best suited to the needs of the company, to enable its customers to increase their competitiveness within its market. 

 Our objectives

In the context of the Information Systems, the PJM objectives find space within a good IT security policy. 
To achieve its objectives, our team ensures information security "TOP", able to shield those who are sensitive data and not, organizing them in private access data and not, and allowing an encryption built tailored to the customer needs. By the appellation Computer security we refers to the study of the vulnerability of a system toward the attacks made from outside or inside by attackers and the adoption of special measures to not allow their success. The detectable threats can be real computer fraud, through the interception of traffic and the flow of data output and input, the attacks on the vulnerability of the data system caused for example by exploit (such as viruses, worms, trojans and similar) or by payload (such as spyware and backdoors). Therefore has become mandatory for all companies that process personal data, adopt a Programmatic Document for Security (PDS) by decree-law 196/2003: companies, professionals, organizations and associations that deal with sensitive data with electronic instruments must implement a effective information security policy
For these reasons PJM considers essential the adoption of an effective information security policy, to prevent and avoid any kind of aggression you might be yours despite protagonists.

 Our offer in 4 phases

Given the different composition of each computer network, embedded within different companies, PJM, with its engineers, it pursues its objectives by offering solutions that can protect your work from any type of attack, analyzing, proposing and creating suitable systems to customer realities with which it relates. This raises the need to address the complex issue of security from different points of view and the choice of adopting different deployment interventions even following to initial installation of computer network security, in order to guarantee it updated at 360 °. The processes that lead to the creation and maintenance of computer network security, through 4 stages, reaching the optimum realization of the offer promoted. 

  1. SOFTWARE INSTALLATION: Antivirus, Anti-Spyware, Anti-Spam, Firewall, Intrusion Detection System (DIS)
  2. PROTECTION HARDWARE: Demilitarized Zone (DMZ), Physical Security, Local Security, Network Intrusion Detection System (NDIS)
  3. METHODS: Backup, Authentication Systems
  4. CRYPTOGRAPHY: Digital Certificate, Digital Signature, Data Encryption Standard (DES), Advanced Encryption Standard (AES)

In accordance with the customer is applied the best combination of services offered, in order to protect all your sensitive data at 360° from any kind of attack can be brought toward your network.