• IT Support

    IT Support

    Covering all aspects of your IT infrastructure.

  • Information Security

    Information Security

    Protecting your most valuable asset.

24/7 IT Support

Round the clock system & user support

24/7 IT OPERATIONS & USER SUPPORT

IT operations and user support 24 hours a day, 7 days a week by experienced and certified professionals.

I?Ii??Ii??Ii??I?I?I?I?Ii??I?Ii??I?Ii?? Ii??Ii??I?Ii??Ii??I?I?Ii??I?Ii??Ii??

ACTIVE DIRECTORY SERVICES

  • Centralised user account management
  • Centralised policy management (group policy)
  • Better security management
  • Replication of information between DC’s
  • Permission based resource sharing

VoIP communications

VOIP COMMUNICATIONS

  • Call recording
  • Conference center with virtual rooms
  • Caller ID
  • Voicemail
  • Call queues
  • Follow-me
  • Multiple trunk support
  • Billing and consumption report

Backup & Recovery

BACKUP & RECOVERY

    Protect you data against loss resulting from:
  • Virus attacks
  • Accidental file deletion
  • OS/software corruption
  • Hardware failure

ERP & CRM systems

ERP & CRM SYSTEMS

  • Automate and speed up your corporate operations
  • Streamline processes
  • Optimize costs
  • Empower timely and effective informed decisions

Network Solutions

NETWORK SOLUTIONS

  • Virtual Private Networks
  • ADSL Bonding and Load Balancing
  • Long Range Wireless Links

information security

Cyber Security

CYBER SECURITY

  • A recommended set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive and dangerous attacks, and improve individual and collective security in cyberspace.
  • Prioritize and focus on a number of actions with high pay-off results, derived from the most common attack patterns highlighted in the leading threat reports.

ISO 27001

ISO 27001

  • A structured, coherent and professional approach to the management of information security, aligned with other ISO management systems
  • Comprehensive information security risk assessment and treatment according to business and security priorities
  • Focuses information security investment to greatest advantage
  • Demonstrable governance using internationally-recognized good security practices

Ii??Ii??I?I?I?Ii??I?Ii??

AWARENESS TRAINING

  • For all functional roles in the organization, identify the specific knowledge, skills, and abilities needed to support defense of the enterprise.
  • Develop and execute an integrated plan to assess, identify gaps, and remediate through policy, organizational planning, training, and awareness programs.

COMPANY PROFILE

logo

CNET IKE, est. 1997, based in Heraklion, exclusively provides high quality services to companies in the field of Information Technology and employs specialised personel with a background in computer science and information systems. Supporting a small number of companies with a combined number of over 900 workstations, located in 20 cities throughout Greece.

No Fields Found.

CLIENTS


CNET Anogion 71 Heraklion, Greece

Test tick to scan developers cashing in on markets abroad complete coverage u.
Contact