{"id":8670,"date":"2025-10-15T10:40:18","date_gmt":"2025-10-15T10:40:18","guid":{"rendered":"https:\/\/digikom.mk\/?post_type=case-studies&#038;p=8670"},"modified":"2025-11-07T11:20:10","modified_gmt":"2025-11-07T11:20:10","slug":"instalacija-na-antivirus-i-farwall-za-sekurnet","status":"publish","type":"case-studies","link":"https:\/\/digikom.mk\/en\/case-studies\/instalacija-na-antivirus-i-farwall-za-sekurnet\/","title":{"rendered":"\u0418\u043d\u0441\u0442\u0430\u043b\u0430\u0446\u0438\u0458\u0430 \u043d\u0430 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441 \u0438 firewall \u0437\u0430 \u201e\u0421\u0435\u043a\u0443\u0440\u041d\u0435\u0442\u201c"},"content":{"rendered":"<p>SecureNet is a telecommunications services company with 120 employees. When they reached out to us, they were amid rapid digital transformation and needed proper data protection, especially against cyberattacks such as\u00a0<strong>phishing<\/strong>\u00a0and\u00a0<strong>ransomware<\/strong>\u00a0which have the potential to paralyze operations and compromise the security of their clients.<\/p>\n<h2><strong>The inspection by the DIGIKOM team revealed:<\/strong><\/h2>\n<p>Local antivirus solutions without centralized management.<br \/>\nNo firewall between the internal network and the internet.<br \/>\n30% of employees were using outdated operating systems, and the outdated Windows 7 machines were an easy target for cyberattacks.<br \/>\nInsufficient awareness among employees, manifesting through opening unsafe attachments and links.<\/p>\n<h2><strong>Solution<\/strong><\/h2>\n<p>Our approach was collaborative. The <strong>DIGIKOM<\/strong> team together with SecureNet, implemented:<\/p>\n<p><strong>1. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u0430 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430:\u00a0Bitdefender GravityZone<\/strong>\u00a0for centralized management of all devices.<br \/>\n<strong>2. Next-Generation Firewall FortiGate 600E<\/strong>\u00a0\u0441\u043e \u0444\u0443\u043d\u043a\u0446\u0438\u0458\u0430 \u0437\u0430:<\/p>\n<p><strong>Invasive traffic filtering<\/strong>\u00a0(e.g., blocking Tor, P2P).<br \/>\n<strong>IPS\/IDS\u00a0<\/strong>(Intrusion Prevention and Detection Systems).<br \/>\n<strong>VPN<\/strong>\u00a0for secure remote access.<\/p>\n<p><strong>3. Update policy:\u00a0<\/strong>Automatic OS and application updates.<br \/>\n<strong>4. Employee training:<\/strong>\u00a0Seminars on recognizing phishing and secure behavior.<\/p>\n<p>The implementation of this project was carried out in 4 phases:<\/p>\n<h3><strong>1.\u00a0 \u00a0Phase 1: Analysis and preparatory steps<\/strong><\/h3>\n<p>Network scanning to identify vulnerable devices.<br \/>\nUninstallation of all existing antivirus solutions.<\/p>\n<h3><strong>2.\u00a0 \u00a0Phase 2: Installation and configuration<\/strong><\/h3>\n<p>Installation of Bitdefender on all 150 devices (including servers).<br \/>\nSetting up FortiGate at the network entrance with rules:<br \/>\nBlocking access to\u00a0<strong>\u043d\u0435\u043f\u043e\u0437\u043d\u0430\u0442\u0438 IP-\u0430\u0434\u0440\u0435\u0441\u0438.<\/strong><br \/>\nLimiting P2P and crypto-mining ports.<br \/>\nSSL inspection for encrypted traffic.<\/p>\n<h3><strong>3.\u00a0 Phase 3: Testing and optimization<\/strong><\/h3>\n<p><strong>Penetration testing\u00a0<\/strong>by \"DIGIKOM\" to verify protection.<br \/>\nReducing firewall latency by fine-tuning the rules.<\/p>\n<h3><strong>4.\u00a0 \u00a0Phase 4: Training and awareness-raising for 120 employees on:<\/strong><\/h3>\n<p>How to recognize phishing emails and attachments.<br \/>\nWhy it is important not to disable updates.<\/p>\n<h2><strong>Results<\/strong><\/h2>\n<p>Six months after the implementation, excellent results were recorded:<\/p>\n<p><strong>Reduced security incidents:<\/strong>\u00a0From 15 per month to 2 incidents (misclassified emails).<br \/>\n<strong>Data protection:<\/strong>\u00a0No successful attacks on the network or servers.<br \/>\n<strong>Performance:\u00a0<\/strong>The firewall uses only 20% of resources, allowing for future scalability.<br \/>\n<strong>Costs:<\/strong>\u00a0Annual cybersecurity costs were reduced by 25%.<br \/>\n<strong>Awareness:\u00a0<\/strong>90% of employees passed the phishing recognition tests.<\/p>\n<p>With this project, SecureNet not only eliminated current risks but also built a framework for responding to future threats. This investment is a key step in maintaining client trust and market competitiveness.<\/p>","protected":false},"featured_media":8763,"template":"","class_list":["post-8670","case-studies","type-case-studies","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/digikom.mk\/en\/wp-json\/wp\/v2\/case-studies\/8670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digikom.mk\/en\/wp-json\/wp\/v2\/case-studies"}],"about":[{"href":"https:\/\/digikom.mk\/en\/wp-json\/wp\/v2\/types\/case-studies"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digikom.mk\/en\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/digikom.mk\/en\/wp-json\/wp\/v2\/media?parent=8670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}