city-interchange-at-night-PQ3JVYL.jpg

SECURITY & INFRASTRUCTURE

SafeStore Delivers Complete Data Protection

Protecting your business-critical data has never been more important or easier to do. Our automated cloud backup and recovery services deliver complete data protection so you don’t have to worry about data loss, network failures, costly downtime, or even worse a complete shutdown of your company.

Today’s businesses rely on technology to get it done -- collecting, retaining and transmitting limitless amounts of data on a daily basis. Without the right data protection plan in place, recovering your data

may be impossible, or just too costly, time consuming and damaging.

SafeStore Covers All Your Data Types

Files and Folders

System Images

Recover from the accidental deletion of any

document, spreadsheet, or folder.

Recover from hard drive crashes and computer viruses.

Exchange, SQL and System State

VMware and Hyper-V images

Enable backup and recovery of Exchange, SQL

data, and System State.

Restore full VM images from the cloud back to

your host or our site.

At Ladonware all our offices are protected by Cisco Meraki Security Solutions. this has allow us to protect our LAN and at the same time configure secure and reliable VPN connections to work remotely. and not only our developers stay connected to our Panama Data Center, all the management and monitoring of all servers is done remotely.

 

Every Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to keep networks secure. Threat definitions and filter lists are seamlessly updated, ensuring every site has bleeding-edge protection from the latest vulnerabilities and troublesome websites.

Seamlessly manage campus-wide WiFi deployments and distributed multi-site networks from a single pane-of-glass.

meraki-managed.png
What is nKode?

A patented, groundbreaking technology that simplifies & secures passcodes like never before.

It allows for passcodes to be just 4 characters long, yet exponentially more secure.

So secure, someone can watch you enter your passcode repeatedly & have no idea what it is.

The nKode can be any Combination of:

NKODE.png
NKODE2.png
  • Numbers

  • Letters

  • Shapes

  • Special Characters

  • Colors

  • Position of Key

  • Uses the common 10-key layout

  • Each Key has Multiple Entry Attributes

  • This Conceals the Intended Selection

Unlimited Interface
 Possibilities

Business success depends on innovation. Reducing time to market, speeding up sales cycles, and improving operational efficiency helps differentiate an industry leader. Timely business insights translate into higher revenue and increased customer satisfaction. With VIOLIN’s Flash Storage Platform, you recoup time and money to reinvest in innovation. The result is enhanced business agility, efficiency, resiliency, and an ROI that helps grow your business success and market leadership. VIOLIN solutions help you turn data into business insight and actionable information that will accelerate competitive advantage at the same cost as legacy enterprise disk solutions.

Virtual Server Technology

Virtualization and cloud computing software that changes the way server workloads run by spreading the work of a given virtual server across multiple physical hosts. It also allows each physical host to run multiple virtual server instances.

The impact of cloud is undeniable: from instant access to infinite IT resources and new application architectures, to redefined IT operations and the acceleration of digital transformation. And now, we’re taking it even further. Any App. Any Cloud.

Flexibility

Build, run and manage modern apps on any cloud.

Savings

Optimize cost and resource management across clouds.

Confidence

Build on the most powerful, most widely deployed cloud infrastructure in the world.

Consistency

Deliver consistent operations from the data center to the cloud to the edge.

A word From

Cybercriminals are now leveraging the global crisis to target businesses of all sizes by launching cyberattacks and phishing campaigns in order to exploit us at a potential time of weakness. There have been warnings issued by government agencies related to cybercriminals targeting businesses that are turning on remote access to their systems in order to help with business continuity. Remote access is a very powerful tool but, if not implemented correctly, may result in a cyber or ransomware attack against the business. As businesses rush to close their physical operations and move to a remote workforce, the improper configuration of these remote access systems can be an easy way for cybercriminals to attack. Please follow these best practices for remote access:

  1. Unless your IT resources clearly understand the risks associated with using Remote Desktop Protocol (RDP), do not allow them to install it. RDP is a highly exploitable technology that is a primary target of cybercriminals.

  2. Utilize a remote control software that allows you to “log in” to a computer at your office.

  3. Make sure the remote control software utilizes Multi Factor Authentication (MFA) so it makes it more difficult for a cybercriminal to hack into your system. MFA sends a text message to your cell phone or an App on your phone to authenticate your log in.

  4. Utilize strong passwords that incorporate multiple words, numbers and special characters for the authentication for the remote control software.

  5. If you are using a VPN, make sure your IT vendor has updated all the VPN software. As of just a few months ago, many VPNs had vulnerabilities that could allow a breach to occur.

  6. Make sure all remote computers are running the latest versions of Windows 10 or MAC.

  7. Make sure all remote computers have anti-virus software installed and the virus definitions are up-to-date.

  8. Use strong passwords on all remote and host computers that incorporate multiple words, numbers and special characters.

  9. For Wi-Fi enabled devices, use the strongest encryption protocol available. WPA3 is the newest. At a minimum, you should be using WPA2.

  10. Do not allow family members to access any device that is used to remote into a work computer.

  11. Make sure you lock the computer before you walk away from it. On a Windows computer, this can be done by pressing the “Windows” key and the letter “L” at the same time.