
Security
Encrypted keys
Firewall management
Security good practices
Access control systems
Periodic backups

Network
Network configuration
VPN
Remote access
Email servers

Monitoring
Continuous monitoring
24 hours alerts
Analisys tools
Periodic backups