{"id":2286,"date":"2025-05-30T11:32:50","date_gmt":"2025-05-30T11:32:50","guid":{"rendered":"https:\/\/ithsolutions.pt\/services\/managed-firewalls\/"},"modified":"2025-10-08T07:45:36","modified_gmt":"2025-10-08T07:45:36","slug":"managed-firewalls","status":"publish","type":"page","link":"https:\/\/ithsolutions.pt\/en\/services\/managed-firewalls\/","title":{"rendered":"Managed Firewalls"},"content":{"rendered":"<section class=\"text-left-image-right\">\n    <div class=\"container\">\n        <div class=\"row align-items-center\">\n            <div class=\"col-lg-6\">\n                                    <h2 class=\"text-left-image-right-title\">Perimeter Protection and Total Network Control <\/h1>\n                                \n                                    <p class=\"text-left-image-right-text\"><p>The absence of a properly managed and configured firewall exposes your company to unauthorized access, external attacks, and loss of sensitive data.<br \/>ITH Solutions implements and manages next-generation enterprise firewalls such as Fortinet, CheckPoint, and SonicWall, which act as the first line of defense against cyber threats. <\/p>\n<p>With a personalized approach, we ensure not only installation and continuous monitoring, but also the definition of security policies tailored to your business, guaranteeing full control over network traffic.<\/p>\n<\/p>\n                            <\/div>\n            <div class=\"col-lg-6\">\n                                    <div class=\"text-left-image-right-image\">\n                        <img loading=\"lazy\" decoding=\"async\" width=\"776\" height=\"230\" src=\"https:\/\/ithsolutions.pt\/wp-content\/uploads\/2023\/10\/Banner-Monitorizacao.png\" class=\"floating-animation\" alt=\"\" srcset=\"https:\/\/ithsolutions.pt\/wp-content\/uploads\/2023\/10\/Banner-Monitorizacao.png 1350w, https:\/\/ithsolutions.pt\/wp-content\/uploads\/2023\/10\/Banner-Monitorizacao-300x89.png 300w, https:\/\/ithsolutions.pt\/wp-content\/uploads\/2023\/10\/Banner-Monitorizacao-1024x303.png 1024w, https:\/\/ithsolutions.pt\/wp-content\/uploads\/2023\/10\/Banner-Monitorizacao-768x228.png 768w\" sizes=\"auto, (max-width: 776px) 100vw, 776px\" \/>                        <div class=\"text-left-image-right-shape\"><\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n <section class=\"three-columns-section column-section\">\n    <div class=\"container\">\n                    <div class=\"row\">\n                <div class=\"col-12\">\n                    <h2 class=\"section-title\">Our Proposal<\/h2>\n                                    <\/div>\n            <\/div>\n        \n                    <div class=\"row\">\n                                    <div class=\"col-lg-3 col-md-6 three-columns-card column\" >\n                                                    <div class=\"advantage-card\">\n                                                                    <div class=\"icon-wrapper\">\n                                        <i class=\"fas fa-puzzle-piece\"><\/i>\n                                    <\/div>\n                                                                                                    <h3><strong>Analysis<\/strong><\/h3>\n<p><strong> Analysis of network infrastructure<\/strong> and strategic definition of security rules<\/p>\n                                                            <\/div>\n                                            <\/div>\n                                    <div class=\"col-lg-3 col-md-6 three-columns-card column\" >\n                                                    <div class=\"advantage-card\">\n                                                                    <div class=\"icon-wrapper\">\n                                        <i class=\"fas fa-shield-halved\"><\/i>\n                                    <\/div>\n                                                                                                    <h3><strong>Installation and Management<\/strong><\/h3>\n<p><strong>Installation and management of physical or virtual firewalls<\/strong>, tailored to the company\u2019s environment and size.<\/p>\n                                                            <\/div>\n                                            <\/div>\n                                    <div class=\"col-lg-3 col-md-6 three-columns-card column\" >\n                                                    <div class=\"advantage-card\">\n                                                                    <div class=\"icon-wrapper\">\n                                        <i class=\"fas fas fa-desktop\"><\/i>\n                                    <\/div>\n                                                                                                    <h3><strong>Monitoring<\/strong><\/h3>\n<p><strong>Continuous monitoring<\/strong>, with regular updates and incident response.<\/p>\n                                                            <\/div>\n                                            <\/div>\n                                    <div class=\"col-lg-3 col-md-6 three-columns-card column\" >\n                                                    <div class=\"advantage-card\">\n                                                                    <div class=\"icon-wrapper\">\n                                        <i class=\"fas fa-chart-line\"><\/i>\n                                    <\/div>\n                                                                                                    <h3><strong>Access Management <\/strong><\/h3>\n<p><strong>Access management<\/strong> by user, application, or location, with traffic segmentation.<\/p>\n                                                            <\/div>\n                                            <\/div>\n                            <\/div>\n            <\/div>\n<\/section>\n \n<section class=\"text-cards-section  \">\n    <div class=\"container\">\n        <div class=\"row \">\n            <div class=\"col-lg-4\">\n                <div class=\"content-intro\">\n                    <h2><strong><span class=\"TextRun SCXW32722014 BCX0\" lang=\"PT-PT\" xml:lang=\"PT-PT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW32722014 BCX0\">Benefits for your company<\/span><\/span><\/strong><\/h2>\n                <\/div>\n            <\/div>\n            <div class=\"col-lg-8\">\n                                    <div class=\"cards-grid grid-two-columns\">\n                                                                                    <div class=\"info-card column\" >\n                                    <div class=\"inner-card\">\n                                                                                    <div class=\"icon-wrapper\">\n                                                <i class=\"fas fa-shield-alt\"><\/i>\n                                            <\/div>\n                                                                                                                            <p><p>Robust protection against external attacks and unauthorized access.<\/p>\n<\/p>\n                                                                            <\/div>\n                                <\/div>\n                                                                                                                <div class=\"info-card column\" >\n                                    <div class=\"inner-card\">\n                                                                                    <div class=\"icon-wrapper\">\n                                                <i class=\"fas fa-file-shield\"><\/i>\n                                            <\/div>\n                                                                                                                            <p><p>Granular control over internal and external communications.<\/p>\n<\/p>\n                                                                            <\/div>\n                                <\/div>\n                                                                                                                <div class=\"info-card column\" >\n                                    <div class=\"inner-card\">\n                                                                                    <div class=\"icon-wrapper\">\n                                                <i class=\"fas fa-sliders\"><\/i>\n                                            <\/div>\n                                                                                                                            <p><p>Compliance with cybersecurity standards (GDPR, ISO 27001, etc.).<\/p>\n<\/p>\n                                                                            <\/div>\n                                <\/div>\n                                                                                                                <div class=\"info-card column\" >\n                                    <div class=\"inner-card\">\n                                                                                    <div class=\"icon-wrapper\">\n                                                <i class=\"fas fa-sliders\"><\/i>\n                                            <\/div>\n                                                                                                                            <p><p>Reduction of operational risk and increase in digital resilience.<\/p>\n<\/p>\n                                                                            <\/div>\n                                <\/div>\n                                                                        <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n ","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":1000,"parent":2273,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2286","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/ithsolutions.pt\/en\/wp-json\/wp\/v2\/pages\/2286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ithsolutions.pt\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ithsolutions.pt\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ithsolutions.pt\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ithsolutions.pt\/en\/wp-json\/wp\/v2\/comments?post=2286"}],"version-history":[{"count":1,"href":"https:\/\/ithsolutions.pt\/en\/wp-json\/wp\/v2\/pages\/2286\/revisions"}],"predecessor-version":[{"id":2287,"href":"https:\/\/ithsolutions.pt\/en\/wp-json\/wp\/v2\/pages\/2286\/revisions\/2287"}],"up":[{"embeddable":true,"href":"https:\/\/ithsolutions.pt\/en\/wp-json\/wp\/v2\/pages\/2273"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ithsolutions.pt\/en\/wp-json\/wp\/v2\/media\/1000"}],"wp:attachment":[{"href":"https:\/\/ithsolutions.pt\/en\/wp-json\/wp\/v2\/media?parent=2286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}