The major manufacturers marketing suggests to us: IT is becoming easier and easier. And there’s no question about it – cloud computing, among other things, has actually simplified many things – for the end user.
The reality, however, is that the underlying infrastructure is becoming increasingly complex.
More and more types of devices are to communicate with each other, preferably on the move. Handheld scanners in production and logistics, mobile devices in the operating room, a mobile computer in a picking vehicle. More and more services are being consolidated onto the network. People are moving. Processes are mobile. The infrastructure must follow. And networking should be as secure as possible.
While the classic system integrators try to take this circumstance into account by consistently expanding their service portfolio, we have opted for a different approach right from the start.
Our approach is consistent specialization.
We design, implement and operate secure network infrastructures. Whether with cable or without (WLAN), whether locally (LAN), as a wide area network (WAN) or in the data center (DC): this is our daily business.
In everything we do, a modern security architecture is paramount. State-of-the-art firewall systems and network-related services (DDI – DNS, DHCP, IPAM – IP address management) consistently round off our portfolio.
As specialists within the specialist, we have divided our portfolio into 4 components. Our employees each have their own personal specialty. In the following, we briefly introduce these 4 components:
In the component LAN we place everything that includes the classic “Local Area Network”. In other words, the wired network at a company’s location.
In recent years, more and more services have shifted to the network. For corporate customers, video surveillance or telephony are probably not the only examples, but by far the most striking examples.
Whereas in the past these systems had their own infrastructures, today these are quite common requirements for a convergent data network.
In addition to the increased demands on bandwidth and resilience, the topic of security has also become more and more common. At least with us.
Certificate-based user and device authentication according to IEEE 802.1X is no longer just wishful thinking, but standard. Of course, this also includes dynamic role and authorization management as well as dynamic VLAN assignment (colorless ports) based on the provided credentials of a user and/or end device.
Our approach of maintaining maximum know-how in a small portfolio is also reflected in the selection of our manufacturer partners. In the component LAN, we work exclusively with products from HPE Aruba Networking and Juniper Networks.
In the component WAN, we place everything that concerns the topic of data center and wide-area networks.
We summarize this because, for us, a resilient, redundant data center is inseparable from a high-performance, resilient and secure wide-area infrastructure.
And due to recent spikes in employees working from home, no area has gained as significantly in importance as the wide area network. All of a sudden, a company’s IT can no longer be an isolated Fort Knox. Employees expect to be able to work from anywhere. This must not create any additional security risks for the company.
Our network infrastructures are able to operate truly active-active. Infrastructures based on self-managed autonomous systems are not exotic for us, but the standard.
Our approach of maintaining maximum know-how in a small portfolio is also reflected in the selection of our manufacturer partners.
In the component WAN & DC, we work exclusively with products from Juniper Networks (data center switches and WAN routers), Arista Networks (data center switches), Palo Alto Networks (client-to-site and site-to-site VPN solutions as well as SD-WAN infrastructures) and HPE Aruba Networking (SD-WAN infrastructures).
For us, the WLAN component includes the infrastructure that we build so that end devices have a secure, high-performance and uninterrupted network connection at all times, even without cables.
In recent years, an infinite number of trends and technologies from corporate IT have managed to find their way into the private home. Wi-Fi is one of the few, if not the only, technology where it was the other way around.The Wi-Fi router was standard at home long before the first companies came up with the idea: devices that move are a great thing!
Due to the above circumstance, WLAN has its own pitfalls. The physical principles are still largely the same as those that prevailed when the technology was invented.
When designing and implementing complex and high-performance WLAN infrastructures, physics is often neglected.
In fact, to a large extent, the success factors in the dimensioning of WLAN are not questions of IT, but questions of radio-frequency technology (RF). Well-founded and capacitance-oriented radio coverage is still the only important key to success.
Our approach of maintaining maximum know-how in a small portfolio is also reflected in the selection of our manufacturer partners. In the component WLAN, we work exclusively with products from HPE Aruba Networking.
In the component Security, we summarize everything that is related to a modern network security architecture.
These are central services for certificate-based user and device authentication in the WLAN or at the switch port, perimeter firewalls for classic north-south traffic, intelligent and integrated systems for filtering east-west traffic in highly integrated and virtualized data centers, as well as network-related services that are often neglected in security considerations, such as DDI (DNS, DHCP and IPAM – IP address management).
The unprecedented increase in threats and cybercrime is fuled due to the increased possibilities of attack.
More and more types of devices are expected to communicate with each other, and media and infrastructure boundaries are increasingly dissolving.
Our approach of maintaining maximum know-how in a small portfolio is also reflected in the selection of our manufacturer partners. In the component security, we work exclusively with products from Palo Alto Networks (physical and virtual firewall systems and VPN infrastructures), HPE Aruba Networking (leaf and ToR switches with integrated east-west filtering using AMD Pensando technology and HPE Aruba Networking ClearPass as a central authentication server) and Infoblox (secure, scalable DNS, DHCP and IPAM applications).
We discuss with you what your needs are and design your optimal network infrastructure for your business requirements.
Get in touch with us right here: