Computer Networking
We have been supporting tens of computer networks and businesses during decades of experience in computer networking realm. Our clients range from variety of business sectors, Medical offices, College camps, Factories, Small business and retail stores to enterprise businesses like car rentals and hospitals.
Computer Networking Solutions
ITperfection offers wide variety of solutions for your networking needs, if you have a small business, or your company has several sites and branch offices, covering thousands of client computers; we can help you with your networking needs.
Certifications
We are certified IT professionals with a wide variety of certifications from industry standard companies like, Microsoft, Cisco and …
ITPerfection Blog
Here you can find a wide variety of blogs relating to Computer Networking, IT security, IT Training, Cyber security, Backup and Disaster recovery, Data protection and ….
Software Firewalls
You know that firewalls exist in both as software and as hardware devices. Each has its advantages and disadvantages. In general, the use of software firewalls for home use, personal use and small businesses is recommended, as well as the use of hardware firewalls for medium and large businesses. To read: All things about firewall To study: Hardware firewalls The subject of this post is the introduction and review [...]
Familiarity with Anti-malwares (Home solutions) – Part II
In the previous post, we reviewed the products of five manufacturers. We now intend to review the products of five other companies. See also: Familiarity with Anti-malwares (Home solutions) - Part I ESET is a Slovak internet security company that offers anti-virus and firewall products. ESET is headquartered in Bratislava, Slovakia, and was awarded the recognition of the most successful Slovak company in 2008, 2009 and [...]
Familiarity with Anti-malwares (Home solutions) – Part I
Another step to secure your personal computer (desktop or laptop) as well as your tablet and mobile phone is to use anti-malware. The anti-malware industry is a relatively old industry, and over the decades many anti-malware manufacturers have become very experienced and powerful. The good news for us end users is that there is very tough competition between these manufacturers and each of them is trying not to lag [...]
Cisco ASA Firewalls
This post is about Cisco Firewalls. It aggregates available information from datasheets published by Cisco. The ASA in Cisco ASA stands for Adaptive Security Appliance. We suggest that you read the following two posts before continuing to read this post: All Things about Firewall Hardware Firewalls In fact, Cisco ASA is a security device that combines firewall, antivirus, antispam, IDS/IPS engine, IPsec VPN, SSL VPN, anti-phishing, and web filtering, and [...]
Network Inventory Tool: LANsweeper
Each network administrator wishes to be able to document the assets related to the computer network in such a way that this documentation always: Be up to date Be reliable Be available This can be done manually: someone examines the assets and records them on a piece of paper or in a spreadsheet file. But this form of asset documenting - at best - does not meet the first [...]
Network Monitoring Tools: Veaam ONE
So far, we have introduced and reviewed several software packages for network monitoring in our posts. In this post, we are going to discuss another powerful software package: Veeam ONE. Veeam ONE, part of Veeam Availability Suite, provides comprehensive monitoring and analytics for your backup, virtual and physical environments. Veeam ONE enables real-time monitoring, business documentation and management reporting for Veeam Backup & Replication, VMware vSphere and Microsoft Hyper-V. [...]
How to Comply with PCI DSS
This post presents How to comply with PCI DSS. This article is a summary from of the pcisecuritystandards.org website. With the following link: PCI DSS Quick Reference Guide For more info please refer to pcisecuritystandards.org We recommend you that before continuing, read this post. Each payment card brand maintains its own separate compliance enforcement programs and it has defined specific requirements for compliance validation and reporting, such as provisions [...]
Security Controls and Processes for PCI DSS Requirements
We already have a post called PCI-DSS that you can read it here. Now, in this post, we are going to get acquainted with the security controls and processes required for a PCI-DSS implementation. This post presents the objectives of PCI DSS and related 12 requirements. This article is a summary from of the pcisecuritystandards.org website. With the following link: PCI DSS Quick Reference Guide For more info please [...]
VPN
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. In other words, A Virtual Private Network is a connection method used to add security and privacy to private and public networks. In very simple terms, a virtual private network connects [...]