HOME
ABOUT
SERVICES
EXPERTISE
CONTACT

1/1
OUR TEAM
OUR CLIENTS
OUR PROJECTS

Complex networking and computer environments, requires automated control, management arrangement and coordination. This will ensure focusing on the business requirements and service provision rather than IT infrastructure management. IT Orchestration is generally the effect of computer environment deploying elements of control schemes. It is discussed in various contexts including Service Oriented Architecture (SOA), Virtualization / Converged Infrastructure, Cloud Computing and Dynamic Data Centres.

ForeScout CounterACT for Network Access Control (NAC) is an automated security control platform that lets you see, monitor, and control everything on your network—all devices, all operating systems, all applications, all users. ForeScout CounterACT lets employees, contractors, and guests remain productive on your network while you protect critical network resources and sensitive data. DOR is a reseller and an integrator of CounterACT, we have extensive experience in configuring and best fitting the product to our customer needs.

IT Orchestration

ForeScout NAC

Business Continuity and Disaster Recovery planning is considered a “safety net” for organisations' very existence that ensures business processes are maintained during disasters. DOR business continuity and disaster recovery methodology starts by identifying the exposure to internal and external risks and threats relevant to the organisation, mapping all business processes, and in turn, synthesise all assets and resources required to support effective recovery of the organisation. We currently conduct few of the most significant BCP / DRP projects in Israel.

In the realm of our expanding electronic world, cyber security is probably one of the most critical and important issues. The increasing security threats, both internal and external, requires organisations to seek for protection for the computing and communication networks in order to ensure business continuity. Exposure to threats from hostile sources include industrial spying, malware and viruses, denial of service, phishing, impersonation etc. DOR specialises in identifying threats and in providing a "tailored security suit" by designing the most appropriate solution with regards to the vulnerabilities found.

Cyber Security

BCP / DRP

Expertise

Information Systems

​

Communication Networks

​

Computing Infrastructure

​

Cabling Infrastructure

​

VOIP / ROIP

 

Telephony Systems

​

Low Voltage Systems

​

Simulators

​

Multimedia

 

Data Centres

​

Command / Control Centres

​

Homeland Security

​

Information Security

 

Monitor and Control

Level 2, Building 111

Logistic Park Tzrifin,

Israel

info@dor-it.com
 

Тel +972 8 9555444
Fax +972 8 9555445​

P.O. Box 422

Nir Zvi 72905​

Israel