An open-source solution

When offering our customers an open-source solution, we ensure it is always done after careful consideration of all the advantages and disadvantages of an open-source code. Moreover, in the vast majority of cases, it is not an isolated solution, but also an interconnection with one or more elements of the enterprise information architecture.

Commonly deployed solutions include, for example, the Linux operating system in various editions (we specialise in Red Hat, Suse, Debian, Centos and Ubuntu), the KVM virtualisation platform, software firewall, Zabbix monitoring system, Elastic Stack event collection and evaluation tool or the SIEM solution for evaluating Alienvault OSSIM security incidents. The offer also includes solutions for application security and OpenVAS incident detection, Bacula backup system or open-source database platforms.

A part of our portfolio also comprises our own solution for advanced monitoring, the GCMP system, which is a solution for complete monitoring of infrastructure, applications and security. The main advantages include continuous monitoring of interest goals in real time, complete modularity and easy adaptation to specific customer requirements. The processed data includes both operational information and data that falls within cyber security.

 

GC Monitoring Pack

A comprehensive solution tailored to the individual needs of the customer. GCMP is constantly evolving and new functionalities are continually being added according to customer and market needs.

 

AGILE DEVELOPMENT

GCMP is constantly evolving and new functionalities are continually being added according to customer and market needs.

FLEXIBLE IMPLEMENTATION

Highly modular solution, enabling deployment in small and large environments.

CONTINUOUS COLLECTION OF INFORMATION

All relevant operations information in one place.

FUNCTIONALITY MODULES

The Log Manager Module for log management is an important tool for ensuring compliance with a number of safety directives and regulations. Log Management collects logs from the IT infrastructure environment and stores them in the event of (not only) a cyber incident. From the logs, it is then possible to find important forensic information about the investigated event.

NetFlow - BETA This is the most widespread network traffic monitoring technology, which provides network and security administrators with a detailed overview of what is happening in their infrastructure. NetFlow significantly streamlines a variety of tasks, such as resolving network operating issues, capacity planning, performance management, and provides information that is important in order to protect your business from cyber threats.

SLA Module for monitoring the set SLA parameters in the environment (Infrastructure, OS, applications, databases,..)

IDS/IPS Sond Intrusion Prevention System (IPS) and Intrusion Detection system (IDS), i.e., intrusion detection and prevention modules that monitor the network and/or operating system activities for malicious activity. The main functions of the IPS modules are identification of malicious activity, recording of information about its course, the subsequent blocking of this activity and its reporting.

SIEM - BETA Module provides a logical separation of security and IT operation. SIEM solutions monitor defined events on the device and are able to interpret potential and real security incidents, as well as the activities of administrators and users.

Monitoring Module for monitoring the status of systems and devices in real time.

Reporting Module for reporting the above-mentioned modules.

PACKAGES

We offer five basic module packages according to individual customer requirements – Start, Standard, Standard+, Premium, Enterprise. Packages can also be expanded with other services.

SERVICE MODE

According to the customer’s needs, we also offer five modes in which we provide the offered services – Standard, Standard+, Gold, Platinum, Enterprise. With a higher mode, you get up to unlimited support options.