The Ultimate Barrier!

  • Increase font size
  • Default font size
  • Decrease font size

The Barrier

E-mail Print PDF

The Barrier is our response to protect our customers from cyber attacks.

We have build a worldwide chain of high-end computers who detect malicious attacks towards our customers.



Our customers have place their websites behind us, so our Barrier receives their traffic, filters it, and delivers to our customers' server only filtered traffic, free of malicious attacks.


Performance Monitoring

E-mail Print PDF

The follow-up of data-processing applications Quality of Service requires powerful tools and accurate competences. The produced and published data must make it possible to appreciate with accuracy the infrastructure Quality of Service total level and the real defects impact on users.

Performance Managers has developed a whole set of tools and competences to quickly implement an application monitoring platform, making it possible to measure data-processing applications Quality of Service, to validate measurements adequacy to the Contract of Service, to provide clear data for the defects resolution, and to even start preventive actions before real users do not feel the impacts of them.


Monitoring or Monitoring?

E-mail Print PDF

When people come to talk about monitoring, each one has his own understanding of what is Monitoring.

Not so often people know that there are different kinds of monitoring. We will try to give some definitions.

First, you have 2 main kinds of IT systems monitoring: performance monitoring and availability monitoring.

Performance monitoring tries to give an image of the ongoing performances of the system, while availability monitoring only tests if the system is accessible, whatever the performances are.

But within these 2 large categories, there are many kinds of monitoring, each giving more or less information on the monitored system.

The answer to availability monitoring questions is always yes or not while the answer to performance monitoring questions is a time measure or a percentage. Obvious?


Performance Booster

E-mail Print PDF

Within minutes, you can bring down your website load of up to 60% without losing any user hit.

More easy is difficult!

You just have to enroll in our Performance Booster Program, and we will serve for you all your static content to your visitors.

Images, javascript files, CSS files, HTML static pages will be stored on our servers and send to your visitors on request.

These files represent from 20 to 60% of visitors hits, and if we manage them for you, it will be up to 60% less hits to your servers, 60% less traffic on your connexion links, 60% less CPU, 60% less disk accesses.


Interpol Calls For Global Effort To Battle Cybercrime

E-mail Print PDF

Original link :

Interpol's Secretary General says the private sector needs to become much more involved in law enforcement investigations to give police the edge they need.

Interpol Secretary General Ronald K. Noble this week called for the creation of an integrated cybercrime investigative to combat the growing threat.

Noble pushed the idea of setting up a network that would enable police anywhere in the world to immediately identify and obtain help from security researchers and investigators in other countries 24 hours a day. He also called for building up information shares called National Central Reference Points and connecting them using Interpol's secure global police communications system, known as I-24/7.

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  Next 
  •  End 
  • »
Page 1 of 2
  • Leslie Jones hits back at hackers in 'Saturday Night Live' rant

    Cast member Leslie Jones poses at the premiere of the film "Ghostbusters" in Hollywood, CaliforniaA day after hackers unleashed an attack on some of the world's best-known web sites, comedian Leslie Jones weighed in on cyber-security in a commentary on "Saturday Night Live," saying cyber criminals could put their talents to far better use than hacking celebrities. Jones, whose own web site was hacked in August resulting in nude photos and personal information including her passport and driver's license being posted, offered her perspective during her recurring gig as an impassioned contributor to the weekly comedy show's "Weekend Update" news segment. "I am very comfortable with who I am. I am an open book," Jones declared, noting "I keep my porn in a folder labeled porn." "If you wanna see Leslie Jones naked, just ask," the comedian added, in what one Twitter user, an entertainment web site editor, said may have been Jones' "finest SNL moment." After starring in the "Ghostbusters" film this summer, Jones briefly quit Twitter because she was bombarded by racist and abusive comments.

  • Attacks on the internet keep getting bigger and nastier
    NEW YORK (AP) — Could millions of connected cameras, thermostats and kids' toys bring the internet to its knees? It's beginning to look that way.
  • Yesterday’s massive Internet outage was caused by hijacked DVRs, webcams and more
    Hackers yesterday attacked Dyn, a major DNS service, with an absolutely massive DDoS attack that swiftly took a number of popular services, including Twitter, PayPal and Spotify, offline. While DDoS attacks are nothing new in and of themselves, there are two aspects to yesterday's widespread assault on the Internet that are particularly intriguing. One, the scale and effectiveness of yesterday's DDoS attack was impressive and brutal. All the more so because just when Dyn had seemingly addressed the issue, the actors behind the attack would launch another deluge of garbage requests. Two, the malware behind yesterday's DDoS attack was effectively a botnet comprised of millions of Internet connected devices, from DVRs and routers to CCTV cameras. In other words, yesterday's attack saw our vaunted Internet of Things  turned against us in an unprecedented way. DON'T MISS:  Everything we know about Apple’s exciting next-gen MacBook Pro Security researcher Brian Krebs has been monitoring the situation closely and notes that the attack was orchestrated by the Mirai malware. You might recall that Mirai's source code was released  just a few weeks ago. Krebs details how Mirai works and why it's so effective. Mirai scours the Web for IoT devices protected by little more than factory-default usernames and passwords, and then enlists the devices in attacks that hurl junk traffic at an online target until it can no longer accommodate legitimate visitors or users. According to researchers at security firm Flashpoint, today’s attack was launched at least in part by a Mirai-based botnet. Allison Nixon, director of research at Flashpoint, said the botnet used in today’s ongoing attack is built on the backs of hacked IoT devices — mainly compromised digital video recorders (DVRs) and IP cameras made by a Chinese hi-tech company called XiongMai Technologies. The components that XiongMai makes are sold downstream to vendors who then use it in their own products. According to Dyn, the incident was officially resolved as of yesterday evening. Developing...