underground8 and triple accesss IT present limes ranges on orbit-iEX Linz, May 21, 2008 together with the Swiss VAD triple access IT underground8 presents Orbit-iEX in Hall 6/booth D24 in innovative security solutions for small and medium-sized enterprises (SMEs) manufacturer of IT security appliances, on the, 2008. With the limes model ranges AS (anti-spam), MF are security now comprehensive SMEs and management solutions available, which has so far been to keep large companies (managed firewall) and TS (traffic Shaper). \”Under the motto of speaking you IT?\” which offers a comprehensive overview of the relevant solutions and products in orbit-iEX business decision-makers. The exhibition focuses on the target group of SMEs, accounting for 99.7 percent of all companies in the Switzerland according to current statistics. For triple access IT and underground8, the subject of IT security for SMBs in the Center stands this year. In the face of the constantly growing threats on the Internet (more than 80,000 attacks per) Tag/Netzwerk) it is important to implement a reliable security solution for protecting corporate data especially for small and medium-sized enterprises. Because these often do not have a dedicated Department, which is busy with the issue of security, the use of appliances is suitable here. These combine several functions such as firewalling, antivirus, intrusion detection and prevention or anti-spam filter in a single device.
Complemented by value-added and consultancy services of the Swiss value added distributors are comprehensive security solutions that follow a holistic concept. Customized IT security provides powerful and comprehensive solutions for the protection of SME networks for SMEs the security portfolio of triple access IT and underground8. The UTM(Unified Threat Management) appliances limes MF are easy to install and to configure firewall systems that are characterized by high reliability and performance. The appliances will receive through the umbrella management designed by underground8 all relevant security updates such as, for example, anti-virus signatures and remote can be maintained on request.