Dasek prides itself on the ability to implement techniques that ensure data stored in our
systems and networks cannot be compromised. We provide extremely quick, secure, and
reliable web solutions, which are built on the most up-to-date technology.


Our server security comprises of a number of security zones. In order to guarantee the highest possible degree of protection, security must be consistently implemented in each zone.

See below for more information on the security zones implemented by Dasek


1. The Infrastructure Zone

The infrastructure zone defines the position of the server within the network. This area must be protected from threats of data sniffing, network mapping, and port scanning. Furthermore, it should not be possible to use this server as a base to launch attacks on other servers.


2. The Network Protocol Zone

It is important that our servers offering Internet services are positioned in such a way that they are protected and hidden by a central component and are located in a separate net. These separated nets are known as demilitarized zones (DMZ). Therefore, access is only permitted to certain server services

The better known device, the firewall, protects the demilitarized zone. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet. All messages entering or leaving the Internet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.


3. The Web Services Zone

The web service zone defines which services are required. Only services necessary for operation are utilized at any given time.

It is important that the web services zone has a close relationship with the application zone, as they work hand in hand to provide the web solutions viewed by the end user.

Our servers utilize J2EE, a platform-independent, Java environment for developing, building and deploying Web-based enterprise applications online.


4. The Application Zone

The application zone is where all the raw data is requested and sorted. You need to perform a search? You need to find any information? It is all done in the application zone.

Each call to the application zone is authenticated and then processed accordingly. If needed, the Oracle database is summoned to fetch and retrieve data. Quick and reliable, just the way we like it.


5. The Operating System Zone

The final protective mechanism is the server operating system itself. We have technicians that detect possible intrusions and immediately respond,blocking unauthorised access to the system. We provide regular backups of all systems. This not only helps to avoid data loss but also allows tracking of any attempted breaches of the systems.

All content property of Dásek Systems Ltd. All rights reserved 2002.