+55 (019) 4062-9788 •

T.I infrastructure solutions

Learn about our solutions in infrastructure T.I.

Tauil develops innovative solutions in the preparation and assembly of infrastructure, network installation for data, voice, sound and image.

Virtualization and consolidation

According to Gartner Group, the average utilization of the server in an organization is 7% of its capacity coming in peaks, just 15%. Consolidate and virtualize means significantly increase processing capacity without the need for expansion of the installed base.

Virtualization and consolidation aims to optimize the IT infrastructure by reducing the operating costs of the data center, optimizing resources and implementing more economic contingency models to ensure business continuity.

Tauil developed a unique and innovative solution for virtualization and consolidation: integrating hardware, software and services is possible for any organization to start the implementation of a virtual and consolidated environment safely and economically.

Focused on the protection of investments made by customers, Tauil solutions also provide benefits focused on sustainability and environmental responsibility, such as reducing energy consumption, physical space and cooling requirements, maximizing infrastructure availability and optimizing the capacity installed.

Specialized services in infrastructure

Network design:

Technical and commercial feasibility analysis, and preparation of detailed designs with the design of new wired access networks or wireless technologies.

Wireless site survey:

Survey coverage information (reception and transmission levels achieved), performance (desired transmission rates), mobility (roaming between access points), physical and logical security, external interference and infrastructure limitations and reporting with the final solution encompassing the number and placement of access points to be deployed and recommendations, following best market practices.

Wireless connectivity:

Networks without local coverage multi-service wire that supports advanced security features, quality of service (QoS) and mobility, and high performance.

Unified Communications:

Increased corporate productivity through the enhancement of collaboration among employees, using various integrated communication tools such as phone, instant messenger, video and web conferencing, and the integration of fixed and mobile devices, and the rationalization of resources such as energy, space and time.

Videoconferencing and telepresence:

Creating an environment with sound and high definition picture which people in different locations can meet virtually and live a similar experience to the classroom, sharing documents in an integrated manner and with low cost of operation and maintenance.

Managed services

Constantly connected to the latest market trends and in tune with the main technological challenges and its customers business, Tauil launches an innovative offer delivery of its recognized systems integration solutions : the Managed Services.

In this new mode , Tauil begins to offer its customers a complete set of solutions in the form of services, avoiding the need for high investments in the implementation of new infrastructure or operation and maintenance of their current systems.

Tauil offers a complete portfolio of Managed Services , taking over the management of converged services information technology and communication to their clients (LAN, unified communications, video conferencing and security). This type of service allows the customer to focus on their business area , sharing the risks and costs of Tauil.


Network Security:

Perimeter Protection: Creation of the first layer of security of an internal network using firewalls to mitigate attacks and traffic control.

Prevention / threat detection: Analysis of anomalies and risks, avoiding the main threats and reducing false positives through integration with vulnerability scanning tools..

Secure Remote Access: Using techniques of authentication and encryption, such as VPN and IPSec SSL, allowing remote access to corporate systems securely.

Mitigating DoS / DDoS: Intelligent traffic patterns analysis to avoid threats to the availability of network services without harming legitimate traffic.

Admission Control: Verification of compliance, remediation and quarantine devices connected to the network based on the corporate security policy.

Event correlation: Automatic management of incidents by consolidating and processing of events generated by the many devices connected to the network.

Physical Security: Controlling access to the organization's facilities and resources by implementing physical protection mechanisms such as biometrics and smartcards.

Data Security

Safe Host: Protection of workstations against attacks by anti-virus , IDS host / IPS and personal firewall , preventing loss.

Secure E- mail: Anti-spam use anti-phishing and anti- spyware for malicious code on the network, as well as mitigation of various threats, such as disclosure of intellectual property and bank fraud.

Email Encryption: Guarantee of confidentiality and authenticity of e- mails through the use and management of digital certificates.

Gateway insurance: Internet Access Control enhancing corporate security policy through URL filtering, SSL scanner, cache and anti -X.

Authentication: Access control to network devices via tokens and authentication software and authorization of users, and the availability of audit trails , based on ISO27001 standards , PCI and SOX .

Security expert services

Plan director of security: Alignment between investments in security and business needs, according to customer needs, the best market practices and applicable laws.

Security Policies: Establishing the organization's security key rules involving people, processes, technology, environment and legal and regulatory aspects.

Risk Analysis: Survey of vulnerabilities in environments, equipment, processes and people, enabling the visualization of existing security risks to the business in each area of the organization.

Security operation center (SOC): Consulting for modeling the Security Operations Center, through the description of processes, definition of working structure (profiles, training and organization) and tools (infrastructure, architecture and functionality), and the development of a implementation plan.