Technologies, Inc.

Company acquired by A Cert heavy Industry in 2009. Mr. Danilo E. Fonseca (CEO)

Cyber Security 

Data Domain understand the growing cyber threats and how to mitigate risk on new attack vectors and how to detect them, security architectures, compliance and legal issues, ransomware, incident response, and network, mobile, and cloud security challenges. Connected cloud and mobile technologies present immense business opportunity, but there is potential for increased risk as organizations increase their exposure to cybersecurity threats. The digital world requires new approaches to protect against, detect, and respond to security threats.

Cyber Security Threats

Connected cloud and mobile technologies present immense business opportunity, but there is potential for increased risk as organizations increase their exposure to cybersecurity threats. The digital world requires new approaches to protect against, detect, and respond to security threats.

Most Institutions Manage IT Internally, Relying On Vendors For A Small Percentage Of Work

  • Protecting against identity compromise and identify breaches before they cause damage
  • Ensuring device security while enabling mobile work for your users
  • The unique perspective Microsoft brings to cybersecurity

Cyber Attacks against banks are “becoming more frequent, more sophisticated, and more widespread.”  Oftentimes not featured in the news are the attacks against “community and regional banks, credit unions, money transmitters, and third-party service providers (such as credit card and payment processors)” who have experienced attempted breaches in recent years. Attacks have come from a variety of actors, including unfriendly nation-states, hacktivists, organized crime groups, cyber gangs, and other criminals.  The report states that “as the cost of technology decreases, the barriers to entry for cybercrime drop, making it easier and cheaper for criminals of all types to seek out new ways to perpetrate cyber fraud. A growing black market for breached data serves to encourage wrongdoers further.” The vast majority of depository institutions surveyed, irrespective of size, rely on both internal and external resources to manage their IT systems. Of large institutions, 75% reported relying on a mix of in-house and outsourced vendor-provided IT systems. Similarly, 62% of medium and 70% of small institutions reported the same. Notably, very few institutions—less than 12% irrespective of size—rely on a completely outsourced IT environment

AT Data Domainination our business is based on the Basic Five Key Pillars Of An Information Security Framework.  Nearly all institutions—almost 90%—reported having an information security framework in place that includes what are considered to be the key pillars of such programs: (1) a written information security policy, (2) security awareness education and employee training, (3) risk management of cyber-risk, inclusive of identification of key risks and trends, (4) information security audits, and (5) incident monitoring and reporting.

AT Data Domainination irrespective of size experienced intrusions or attempted intrusions into our IT systems over the past three years. The our methods did not ran the gamut, e.g. other companies reporting incidents involving malicious software (malware) (22%), phishing (21%), pharming (7%), and botnets or zombies (7%). The larger the institution, the more likely it appeared to experience malware and phishing attempts. About 13% of small institutions reported being attempted targets of malware, as compared to 21% of medium institutions and 35% of large institutions. Similarly, about 16% of small institutions reported attempted phishing, as compared to 22% of medium institutions and 33% of large institutions.  The have experience all types of wrongful activity resulting from a cyber intrusion reported by customers were account takeovers (46%), identity theft (18%), telecommunication network disruptions (15%), and data integrity breaches (9.3%). Third-party payment processor breaches were also reported by 18% and 15% of small and large institutions, respectively. Large companies also cited mobile banking exploitation (15%), ATM skimming/point-of-sale schemes (23%), and insider access breaches (8%).

Our Security Services

With Rackspace, an innovative Managed Security Services Provider (MSSP), you get active threat detection plus rapid remediation. Most MSSP’s simply notify you of a breach — leaving it up to you to respond. We respond immediately to threats and cyberattacks on behalf of our customers, effectively minimizing business impact.

20016 Cloud Securities Excelent Award winner, as leader in cloud delivered secturities[/ezcol_1third]

Leverage our experience safeguarding 100,000 customers, including over half of the Fortune 500.
Leverage our experience safeguarding 1000,000 customers, including over half of the Fortune 25+ years hosting experience securing a global footprint in 5+ countries with a team of seasoned experts.

Data Domain is consider industry leading company net works provider, When it come to setting up Routers and Switches, creating Vlans, separating network traffic based on departments, users group, using ACLs/RACLs to allow or deny access to resources on the network, setting up trunks and Etherchannels, setting up redundancy among switches using HSRP. Setting up Private Vlans to separate traffic within server farm sitting on the same lan. Securing network against possible spanning-tree disruptions, such as rogue access point additions and loss of stability to the root bridge by the addition of switches to the network. Securing Layer 2 swithces against MAC flood attacks, preventing DHCP spoofing attach and preventing unauthorized access to the network using AAA and 802.1X. Setting up routing using RIP, EIGRP, OSPF and BGP. Setting up multi-area OSPF. OSPF over Frame Relay, route distribution between different protocols like RIP and OSPF, OSPF and BGP etc. Troubleshooting issues related to EIGRP, OSPF and BGP protocols. Setting up IP phones using Call Manager Express(CME) and CUCM, integrating CUCM users with Active Directory. In short expertise in

  1. IPV6 implementation with OSPF, EIGRP and RIP, using different tunneling methods
  3. BGP Implementation
  4. Layer 2 technologies including ISL/802.1Q/STP/RSTP/MSTP
  5. VLAN/Private Vlan/Super Vlan/Community Vlan
  6. Etherchannel technologies like LACP/PAgP
  7. VPN setup using IPSec, knowledge of AAA and 802.1X
  8. Access list expertise, like standard, extended, VACL, PACL, Route-map, Vlan map.
  9. Troubleshooting skills using Wireshark and Netmon
  10. Voice over IP Knowledge, Unified communication setup using Call Manager Express(CME) and CUCM
  11. Enterprise Wireless Network setup