Untitled Document
Need additional information about the services listed here?
Contact our Sales Dept:

Once you connect your business LAN to the Internet, how do you keep hackers from stealing your private information and interrupting your business services? At a minimum your system should have a firewall, either hardware, software or a combination of both to intercept all packets entering and even leaving your network. If you require Internet facing servers, you can create a DMZ (De-Militarized Zone) that is segregated from the rest of your network and does not store confidential data and only runs the necessary web services to communicate with your clients, vendors and partners.
An IPS (Intrusion Prevention System) or an IDS (Intrusion Detection System) is a great companion to the firewall. These can be standalone appliances or integrated within your firewall that use signatures and other metrics to analyze the traffic that you do allow into your system to see if the packets are part of an attack. An IPS can actually stop the packets cold at your parameter and even email you a recommended configuration to prevent future attacks. An IDS will detect the attacking packets and alert you to problem so you can analyze the situation further.
As your servers, firewall, IPS and or IDS and switches perform their duties, it's important to collect information from those systems to see if they are still running, have crossed a threshold like low disk space, overloaded like a maxed out CPU or RAM, malfunctioning and errors, general information, or being attacked. Depending on the complexity of your system, the reporting coming from these devices could be overwhelming. You need a smart way to consolidate this information into something meaning while reporting to the correct members of your team.
Today's hackers don't want to destroy your system or data, they want to use it and steal it. Whether they're enslaving your system to be part of a zombie network to attack Internet sites for ransom (like a Denial of Service Attack on a gambling site before a big game) or just snooping around your data looking for credit card or other confidential data, hackers are a busy and creative group of individuals. To keep your systems protected, you business systems should have anti-virus and anti-spam systems running and up-to-date at all times.
Email's mundane architecture makes it a primary candidate for receiving virus, trojans and worms or an avalanche of junk mail since hackers can make the email appear to come from either someone you know or a legitimate company. Anti-spam can help you reduce the amount of junk emails and emails from known spam relay email servers to clean up your mailbox. Mail Security can also scan emails for virused and quarantine them when discovered. It can also prevent mail bombs and oversize attachments from bringing your mailbox and email server to its knees.
If your business is required to maintain either SAS-70 or HIPAA compliance, we can help. Our team of security specialists can help you going forward if you already have these certifications or help you obtain one if this is your first time. We can walk you through the steps of a SAS-70 type I and type II certification as well as auditing your system to achieve HIPAA compliance.
Attacks don't always come from the outside, do you know who's inside your office plugging in their laptop into your network? Is their system clean? Are they exposing your network to an infected system that is always trying to spread. What about your users? Do you have an unhappy or malicious user exploring your network looking for something interesting? What about home users that are VPN'd into your network? Are they connecting with an infected system? Learn how to protect your network inside and out with the power of a Network Access Control device.