The company network connects all areas of your company: Departments, people and machines, locally and worldwide. It brings information quickly and securely to the destination, provides data centrally and independent of the location and prevents any data loss. The network bears a large part of the business activities. It must be stable, secure and reliable. Round the clock, on every day of the year.
You can find the optimum network solution for your company with MarcanT. Depending on your needs, we plan, install and scale your network, virtualize your server structure, handle maintenance, availability and protection and monitor all functions 24/7. And you? You can concentrate fully on your core business.
We would be happy to explain how your network could appear in the future with a personal consultation appointment. Do not hesitate. Contact us now.
Our services in detail:
We assist you in the planning, licensing if necessary, implementation, migration and maintenance of your network, incl. the structuring and assignment of user rights. In doing so, we support Microsoft platforms and applications as well as open source solutions of Linux too.
Further links on:
We safeguard your (global) corporate network externally – with a next generation firewall. We install the firewall and configure it according to your security requirements, handle the maintenance and keep an eye on it around the clock.
We establish a VPN infrastructure for you for a secure and stable connection of additional sites, employees or other guests to your network. On the one hand, this facilitates protected data transfer via just one Internet interface. On the other hand, you can effectively monitor all network-internal Internet activities.
Our firewall solutions:
Consulting: IT security
We make more from less. We optimize the utilization of your hardware with a virtualization solution tailored to your needs. This means for you: more performance across fewer computers, more flexibility for your IT network and real cost reductions thanks to the lower energy, space and administration costs.
We provide you with an efficient, highly available and fail-safe server environment thanks to our many years of experience and the intelligent combination of virtual and physical resources. In doing so, we always have the entire data centre in view, including network infrastructure and storage.
Products we use:
Further links on:
Nothing can run smoothly in your company without a functioning Internet connection: E-mail, Internet telephony and network connections to customers, suppliers or external sites. To avoid cost-intensive downtimes, we develop a coherent and high-performance redundancy concept for your company's Internet access – and this (as one of the only few providers in Germany) as a completely carrier-neutral solution on request!
In doing so, we take over the router management, monitoring including troubleshooting, and thus guarantee the greatest possible connection stability.
How secure and stable is your network really? To answer this question, we put your company network to the test. We uncover the security gaps with an individually designed analysis strategy. Typical risks include, for example, superfluous services (such as Kazaa, Finger, Telnet), bugs in web servers, mail servers, database servers, default passwords on routers, switches, print servers, unprotected file shares, denial-of-service attacks and open backdoors by Trojan horses.
A good example of our approach is the so-called "penetration test". In doing so, we take the position of potential hackers and try to externally overcome your security systems. Curious to see if we can do it? Just give us a call now – our specialists are looking forward to the challenge.
Desktop PCs, printers and notebooks – the modern workplace consists of more than just one terminal. Managing all these clients individually is no longer an option. To ensure secure and productive use, desktops must be deployed and managed centrally and independently of the hardware. Thus, you keep control of your clients and preserve the resources of your IT department. Client management by MarcanT covers all services from the installation and training of new clients to the disposal of the old devices. We securely integrate all terminals into your company network, virtualize the desktops and make sure that all clients and applications are reliably kept up-to-date – including the migration to Windows 10.
Wireless internet has now become a standard feature for modern companies. Unfortunately the same also applies to WLAN failures, connection interruptions and coverage holes. We ensure that your wireless network functions smoothly – through professional highlighting and optimal planning of the access points, even for difficult WLAN environments such as high-bay racking in the industry. Our solutions are adapted to your requirements and are also retrospectively scalable.
Security is without a doubt and important issue with the WLAN set-up. In addition to the authentication and encryption strategies, we also offer you the possibility of defining user groups. You therefore retain full control over the use of your network and can, for example, temporarily provide guests with separate internet access. Do you have any questions about WLAN or would like an individual quote? Contact us!
Hardly any industry is still without them: Smartphones and tablets increase mobility and productivity and not least provide motivation for your employees. Used correctly, this state-of-the-art technology brings plenty of advantages – and a big challenge at the same time: Since extensive configuration settings are required to manage and protect your organization's mobile devices.
MarcanT finds the perfect solution for you and develops an infrastructure, which allows you to manage all devices remotely: from setting up passwords, controlling the Apps used to geographical tracking, blocking and deleting of devices. You can also define security rules for sharing files and media, including the full blocking of print, email and other media share options.
In doing so, you have the option of whether you prefer a software or cloud-based technology. We are of course also happy to advise you here!
Other options include:
Speak with us, we would happily prepare an individual quote for you.
DDoS mitigation is used to protect your critical IT infrastructure against DDoS attacks (distributed denial of service) on the most frequently attacked services on the internet.
The conveyance of all the data traffic through the systems used (scrubbing) ensures that only legitimate traffic flows through your systems. You therefore receive the maximum possible security against attacks and your data is always available.
Quickly and easily
use the callback
function to schedule
OUR OTHER SOLUTIONS AND SERVICES