The line of products we use in our work belongs to the "best of breed", we use only the best
for you, because each manufacturer from our offer is the market leader in its industry.
Utilitas I.T. d.o.o. is a company founded with the aim of becoming a leading company in the
segment of information security and the provision of information security solutions, and to offer complete
information security solutions to end users through the network of its partners.
Utilitas I.T. d.o.o. is specifically focused on providing consulting
services, delivery and implementation of solutions in the field of IT security (protection against
viruses and other malicious code such as spam, spyware…), Intruson prevention (IPS), firewall, secure
proxy, database security and compliance with regulations such as PCI DSS, SOX, HIPAA etc. as well as the
supervision of privileged users, identity management, protection of confidential data by encryption, and
with the help of ours partners to connect your IT with your business processes.
The line of products we use in our work belongs to the "best of breed", we use
only the best for you, because each manufacturer from our offer is the market leader in its
Utilitas I.T. proudly stands out as IBM's leading partner in the implementation of
this product in the Republic of Croatia.
With the quality of services we provide, our goal is position Utilitas I.T.
d.o.o. as a leading partner in the field of I.T. security implementation in the country
Bring partners (users) in a position to Utilitas I.T. d.o.o. perceived as a
natural and logical choice for building the security of their information system
Improving the business of companies by implementing quality IT solutions with an
emphasis on providing quality consulting services, supply and implementation of solutions related to
the security of IT systems
Giving new values to the business environment with an emphasis on the use of
new technologies and solutions that enable competitive market status
Preparing business entities to enter the EU business environment.
Raise the quality of information systems security implementation service to the
level of positive effect for the user
Demonstrate and prove that security information systems within a company
really contribute to its faster and better development
Preparing business entities and partners for market competition in the EU.
UTILITAS I.T. limited liability company for computer activities
The company is registered in the court register of the Commercial Court in Zagreb under the company's
(court) registration number: 080657093
The company's commercial bank is Zagrebačka banka in Zagreb
TThe share capital of the company amounts to HRK 20,000.00 and has been paid in full
The director and owner is Tomislav Mikolavčić, he represents the company individually and
Contact us with confidence, because our name speaks for itself (utilitas -
The AVNET Distributor Award was presented to the Utilitas I.T. in the IBM Software
Unique Solution Area category, again demonstrating the focus on the IBM Security Guardium
protecting and monitoring database activities.
Blue Coat Systems, Inc., was founded in 1996 in Sunnyvale,
California, dealing with proxy solutions on which it still bases its offer today.
In 2016, it was purchased by Symantec. Over the past year, the
quality of its products has become the world's leading manufacturer of security solutions for WANoptimization and protection of Gateway-a, which is confirmed
by independent research companies such as Gartner, IDC and Forrester.
In recent years, the way of exchanging information has changed significantly. Today's
companies often do not have firmly defined boundaries within which it is necessary to protect the IT
infrastructure and data, and large amounts of information are exchanged between individual geographical
locations connected by WAN networks. As a result, the web browser has become a major resource for accessing
information such as email, business applications, and data exchange, allowing employees to work beyond the
physical boundaries of the office.
With the rapid development of Web technologies and the transition to the Web browser
as the central point of communication and business, a whole range of security threats has developed that
take advantage of its growing popularity. With this solution, Blue Coat ensures companies secure use of the
Internet as the main resource for accessing and transmitting information, and ensures the continuity and
reliability of business applications.
Blue Coat ssecurity solution installed on the Gateway (central
point of entry and exit of Internet traffic from the company's network) provides users secure content when
working within a Web browser, stopping threats coming from the Internet using various protocols (http,
https, ftp, IM, etc.), and increases employee productivity by filtering Web content that has not been used
for business purposes.
The solutions also offer real-time reputation based malware filtering which helps detect new,
targeted attacks. In addition to web security options, available adjacent integrations include
integration with Web Isolation, Symantec Mail Gateway, Symantec DLP, and Symantec CASB (CloudSOC), Advanced
Threat Protection (ATP) and Symantec Endpoint Protection solutions. Symantec has also introduced the
Integrated Cyber Defense eXchange (ICDX), as a platform to integrate Symantec and partner security
In the Web Security space Symantec provides the following solutions:
Symantec Web Security Service (Cloud Service) – lets customers deploy a Web security
solution in the cloud, or as a hybrid solution when combined with the vendor’s on-premises
solutions. The cloud solution is available as follows:
Web Security Service (WSS)
Mobile Device Security
Hosted Reporting Service
Malware Analysis Service
Cloud Firewall Service
Symantec ProxySG and Advanced SG (ASG)- are available as an appliance, or separate virtual
appliances. ProxySG provides a modular Web security solution that allows components to be added as
needed. ASG is an integrated solution, which combines ProxySG and Content Analysis System functionality
in a single appliance. ProxySG and ASG utilize the Internet Content Adaptation Protocol (ICAP) to relay
certain requests to other appliances built for a specific task, such as DLP. With ProxySG and ASG,
customers can analyze their SSL encrypted web traffic. The following components can also be added to
ProxySG and ASG appliances:
Symantec Intelligence Services
Feel free to contact us for more information on Symantec Blue Coat products, we will be happy to arrange a
presentation or non-binding testing
IBM Security Guardium
Guardium was founded in 2002 with an exclusive focus on real-time database protection,
while providing insight into all transactions and enabling automation of the compliance audit process.
Today, Guardium offers companies a simple and robust hardware solution for protecting financial and ERP
information, user and card data as well as intellectual property stored in systems such as Oracle, SAP,
Siebel or other SQL databases.
At the end of 2009, IBM acquired Guardium, rounding out its database security product
The need for a solution of this kind is best illustrated by the following example -
when you think about it, most financial data is just an entry in some database, a money transfer is a change
of the required entry and an update of another. How do you know who is updating and how they are entering
data in your databases? More and more people have access to various databases, the amount of information is
constantly growing, systems are more complex and reporting is difficult.
The Guardium solution allows you to completely monitor the activities of your
database (databases), as well as conduct security controls, offering a dedicated hardware system that:
monitors and records access to databases by users but also privileged users
understands commands and transactions (DDL, DML, DCL, PL, XML…)
aggregates and correlates database activities for detailed reporting purposes
eliminates the need for native logging on the database itself and frees up
resources by offering more detailed reports through logs on the device itself
enables the implementation of the division of responsibilities and tasks within the
organization (segregation of duties)
detects all databases in your system
reveals frequent omissions (vulnerabilities) in the bases themselves
By using the Guardium solution, you can successfully solve your problems related to
heterogeneous systems, different types of users and various access points to databases, with a complete
insight into the activities without the need for intervention on the databases themselves.
Three key reasons why companies choose Guardium:
security and visibility of information
faster and easier audit management
reducing compliance costs
Feel free to contact us for more information on Guardium products, we will be happy
to arrange a presentation or non-binding testing!
The Cyber Ark system allows complete control of the activities of privileged users (system administrators),
privileged applications and processes within the IT infrastructure, regardless of resource or location,
without the need to install a software agent on a single computer.
Cyber-Ark is a manufacturer of security solutions, founded in 1999 by world-renowned security experts in the
field of information security, headquartered and developed in Israel. Focused on developing solutions for
the protection of highly confidential data as well as for the management of administrative and privileged
user accounts, Cyber-Ark is one of the most recognized manufacturers in the corporate security segment. This
is confirmed by the independent analytical house Gartner, which has classified Cyber-Ark as one of the
leading manufacturers in the field of Privileged Identity Management solutions.
Cyber Ark's offer is divided into the following products:
Privileged Identity Management (PIM) Suite, a security solution designed to protect, manage and monitor
all administrative and privileged accounts present in the user's IT infrastructure, thus providing
protection against internal threats and loss of confidential information
Privileged Session Management (PSM) Suite has the main role of managing real time sessions of privileged
users, whether applications, processes or administrators
Sensitive Information Management (SIM) Suite is a product that provides a secure repository for
monitoring, managing and protecting confidential information and documents within the enterprise
environment, and ensures secure communication and data exchange channels.
Privileged Identity Management – Privileged Session Management – Secure Digital Vault – Data encryption &
secure file exchange
UTILITAS I.T. provides its customers a quick response and assistance in solving everyday problems in the
operation of the system it represents and sells. Proactive action in the prevention of possible problems gives
security to the users of our services.
Support for customer systems can be arranged according to a variety of customer requirements. When contracting
technical support services with the user, it is necessary to conduct an in-depth analysis of the state of the
system according to the project of equipment implementation. After the analysis, a plan for providing services
is made according to the analysis and user needs, and according to the type of equipment used.
By concluding the contract UTILITAS I.T. takes full care of the supervision, management and maintenance of the
user's equipment specified in the contract.
standard support - solving equipment operation problems based on technical support contracts
on-call support - solving equipment operation problems for users of smaller systems outside the
contract. The number of hours of customer support is not limited. Payment is made according to the valid
emergency intervention - with the above support models there is the possibility of emergency
intervention. UTILITAS I.T. guarantees the response of professional staff as soon as possible. Payment is
made according to the valid price list for emergency interventions.
UTILITAS I.T. enables users of its services to report an incident or request for intervention in the following
by telephone registration - notification to the telephone number of the technical support of UTILITAS
I.T. - notifications are received on working days from 8 AM to 4 PM, all notifications are recorded in the
technical support application
notification by fax - notification to the fax number of UTILITAS I.T. - the notification must contain
the following information: company / user name, company OIB, company address, telephone number and e-mail
contact of the user, and description of the incident / request. Notifications can be sent 24x7x365. All
notifications received after 4PM are processed the next business day. All notifications are recorded in the
technical support application.
notifications by e-mail - notifications to the e-mail address UTILITAS I.T. support - the alert must
contain the following information: company / user name, company OIB, company address, telephone number and
e-mail contact of the user, and a description of the incident / request. Applications can be sent 24x7x365.
All notifications received after 4PM are processed the next business day. All notifications are recorded in
the technical support application.
The response time of the HelpDesk to the user according to the received notification is within 2 hours from the
moment of receiving the notification within working hours. All notifications received after UTILITAS I.T.'s
business hours are processed the next business day.
Maintenance of information systems
Today's business needs set the condition for creating the technological environment necessary for their own
business and its specific needs, and more importantly that the environment is always available, active and is a
represent of business goals, not an obstacle to work and decision making. By using information system
maintenance services, in addition to using the available resources in a quality way, you also protect your
business and minimize risk.
Maintenance services of information systems or parts of information systems are variable and depend on the system
itself, its condition, as well as on the needs of users. Although it is common and practical to maintain the
system through a continuous relationship, some users are also determined by the option of periodic maintenance
based on their own resources or lower maintenance requirements
As maintenance is individualized according to the needs and requirements of maintenance service users, it is
common to combine maintenance services with other services or solutions. This achieves an extremely good result
in terms of cost, and is the most popular way of cooperation.
The benefits that Utilitas I.T. can point out as their own competitive advantage are extremely fast response to
customer inquiries, respect and appreciation of customer requirements, procedures and ways of doing business,
constant investment in education and training, and expertise and commitment.
UTILITAS I.T. provides its customers consulting services with information technology application. By using these
services UTILITAS I.T. helps its partners and customers to take advantage and apply all the benefits of new
technologies, and thus increase their productivity and competitiveness in the market.
Our team of experts with extensive experience in the IT industry is trained to provide expert advice on IT
security systems, and the relationship between the benefits and risks that individual technologies bring.
At any time, our experts are ready to provide customers optimal solutions to IT systems and problems, and our
biggest advantage is that in addition to consulting we can offer the optimal technical solution and its
implementation on a turnkey basis with the use of equipment that belongs to the "best of breed” in its
As direct partners of manufacturers and distributors, we make sure that our employees are adequately trained, and
thus maintain a high level of service.
Using the most advanced software packages, we create documentation for your network and network
Contact us for more details
Office: Vranovina Street 9Vukovar City Street 22410 000 Zagreb