This post is also available in: Danish

No network is secure – however, it is possible to protect the business and its data by working purposefully with IT security. The classic tools are firewall and AV, but also two-factor authentication, encryption and active monitoring of network traffic are examples of techniques that must be used for due diligence.

Read more about security below.

Sikkerhed Beskyttelse af forretningen og dens data ved målrettet arbejde med IT sikkerheden  

Next Generation Firewall

Next Generation Firewalls combines the traditional firewall functions of filtering of network traffic based on the content of the data packets. Use of signature-based IPS, whitelists/blacklists, inline scanning and advanced threat protection are among the techniques that a modern firewall contains. The solution combines simple installation with a simple administration interface which makes it possible to administer a technical solution to a high level with a minimum of resources. Read more about Sophos UTM at Sophos

Antivirus and endpoint

All operating systems are vulnerable to malware. An AV solution must be able to protect all of its platforms – eg. VMware, Windows, Mac, Linux and Android – and contemporary AV contains far more components than just signature-based scanning. Active cooperation between the firewall and AV agent is an example of the latest developments in AV, where real-time threat intelligence is an elementary part of the solution. Read more about Sophos and Avira.


Data is today not only in corporate networks: They are found on laptops, mobile devices, in the cloud or shared via file sharing programs such as Dropbox. Professional encryption solutions ensure data efficiently anywhere – without lowering productivity. It can be built on existing components such as Microsoft’s BitLocker or Apple’s FileVault. Read more about encryption at Sophos and SmartSignatur .

Backup and disaster recovery

Backup and disaster recovery is not the same. Fast recovery is an essential component of IT contingency plan, and there should be a SLA on how quickly the IT infrastructure can be restored in case of complete failure. Quick restoration of data from specific times is the classic task on traditional backup, which focuses on generations of data, routing of backup data in the network and staging of backup to other media. Read more about backup and disaster recovery at Acronis and SEP.

Password management

A well-functioning password management system should be easy to install, and tailored to individual business needs. This means higher security, more satisfied users and less strain on the IT department. Self-service enrollment and password reset, possibly combined with SMS verification are examples of value-adding technologies. Automatic synchronization of passwords between systems should be immediate. Read more about password management at NetIQ

Governance, compliance and access management

Centralizing user identities, roles, policies and risk management makes it possible to have a unified management tool that accomplishes the company’s compliance requirements. Read more about compliance and access management at NetIQ

Log Management

With a contemporary log management/SIEM solution, it is possible to create an overview of the entire IT infrastructure. A unified solution that collect, store, analyze and react to events in IT infrastructure and logs in real time and correlate these with user identities. This provides the necessary overview and the ability to document events accurately. Read more about log management at NetIQ