EN
How it works
Offer
For whom?
E-commerce
Conference support
Mass events
Hotels
Telecommunications operators
Commercial developers
Hospitals and medical facilities
Sports facilities
Office building managers
Large corporations
Micro companies – SOHO
Startups
Blog
Business
Help
Contact
PL
DE
UK
Offer
Recommended ITH services
Symmetrical Internet access for ITH Net business
WiFi as a Service
Network as a Service
Managed Firewall
Asymmetric SOHO internet access
Symmetrical Internet access for ITH Net business
Data transmission
WiFi as a Service
ITH network
Connection with global clouds
Television for hotels and business
ITH Ready
Public Cloud
Connection with global clouds
Dedicated servers
Collocation
Co-location facilities
Connection with global clouds
Server administration
IT security audit
Infrastructure vulnerability scans
AntiDDoS protection
Managed Firewall
Backups
IT services for companies
Conference and event services
IT audit
Server infrastructure administration
Network infrastructure administration
Network as a Service
WiFi as a Service
Security services
Computer and network equipment
Network management by ITH engineering team
WiFi Design and Measurement
Virtual Headquarters
SIP Trunk
A phone subscription
IP Phones
Web Systems
Construction of structural networks
Video surveillance
Access control systems
Alarm Systems
Smart Buildings
Fiber optic welding and measurements
Services for operators
Recommended ITH services
Symmetrical Internet access for ITH Net business
WiFi as a Service
Network as a Service
Managed Firewall
Help
FAQ
Privacy Policy
RODO
Documents and Regulations
Business
Affiliate Programme
Our partners
About us
ITH Ready
Investors
Press office
ITH Academy
News
References
For whom?
E-commerce
Conference support
Mass events
Hotels
Telecommunications operators
Commercial developers
Hospitals and medical facilities
Sports facilities
Office building managers
Large corporations
Micro companies – SOHO
Startups
Securing your computer
Homepage
Categories
Security
Data security
SSL Certificate
Trivia
Cloud computing
Firewall
Hosting
Internet
Securing your computer
RODO
10.02.2024
Security
Announcement regarding critical vulnerability in Fortigate devices
A critical vulnerability in Fortigate devices was disclosed on 08.02.2024. The security hole could lead to attacks on network...
06.02.2024
Security
Cyber security in business – how to avoid the pitfalls of Whaling and Business Email Compromise?
In a cyber world full of threats, concepts such as Whaling and Business Email Compromise are no longer just...
16.01.2024
Data security
Protecting the corporate network – comparison of software and hardware firewalls
Network security is one of the cornerstones of any enterprise’s online operations. A firewall, or firewall, is one of...
29.12.2023
Security
Don’t get caught! Everything you should know about Phishing
There was a time when clumsily worded emails from cybercriminals were as easy to detect as a cactus in...
05.03.2021
VPN
IT trends for 2021: part 2.
Cloud computing, cyber security – what other trends do industry experts point to? This is the second part of...
25.02.2021
Internet
Technology trends for 2021: part 1
In today’s world, where we are still struggling with the COVID-19 pandemic, reality is unpredictable. What is certain is...