«Eclipse Electonics» DMCC offers a complete range of services for developing
and implementing enterprise solutions in the field of telecommunications.
Definition of business goals
and technical production tasks (TK)
Documentation of existing
network / information resources
Advice on the choice of
products/solutions to perform tasks
Design (conceptual, technical design)
Development and adjustment in
the customer’s network «pilot» project
in the implementation of innovative solutions
Monitoring and control
Training of the customer’s
employees to operate
Solution optimization according
to changing business requirements
Local network — wired and wireless infrastructure with the
necessary level of resiliency, QoS support, etc.
Corporate Network — branches unification as a single multi-service
network for the efficient operation of all departments.
Network data center — a high-performance, fault-tolerant
architecture for the solution of customer needs
Telepresence (TelePresence) — meeting room to create
comfortable conditions for remote business communications.
Contact centers — solution to increase the loyalty of your customers
and opportunities to handle a large number of cases efficiently
to a small number of employees of your company.
Security gateways (firewalls, NGFW, NGTP, UTM, WAF, VSG)
to protect the network perimeter, critical areas of networks,
critical WEB services, protection of virtualized infrastructures,
cyber threats protection.
Content-filtering gateways (Cisco Ironport ESA, WSA,
CheckPoint NGTP) to monitor the safe use of internet and e-mail resources.
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
to monitor network traffic and system activities for malicious
activity, identify it and prevent/block intrusions that are detected.
Systems to prevent data leakage (DLP) to detect potential data breaches
or enterprise data leakage and prevent them by monitoring,
detecting and blocking sensitive data from leakage incidents.
Protection systems DDOS attacks to prevent failures of service,
even in a distributed attack.
Two-factor authentication systems to enhance the level of security.
Systems of information security events (SIEM) to provide real-time
analysis of security alerts generated by network hardware and applications.
Penetration tests to identify ways to exploit vulnerabilities
to assess the level and stability of IT infrastructure.
Server solutions. System optimization for specific customer’s problem.
Data storage systems for efficient management of enterprise data
and provide the necessary resources to complete tasks.
Efficient use of disk space (data deduplication).
Backup systems to restore critical information as soon as possible.
Virtualization systems for deployment application failover
infrastructure and more efficient use of hardware platforms.
Storage Information Network (SAN) — the possibility of
providing a plurality of resources a plurality of data storage server platforms.