Internet Services
Perimeter defense is one of the most important pieces to the network vulnerability puzzle. Although your business may not be a target by any person or entity from a hacking standpoint, it is the untargeted brute-force broadcasts that hackers unleash that cause problems most frequently. Some examples of stray packets found frequently in the logs of firewalls are Denial of Service Attacks, Pings of Death and Sub Seven attacks.
Firewalls keep your network protected from unauthorized access. When you connect a computer to the public internet, you immediately become vulnerable. Firewalls not only restrict network access by unauthorized users, but also by unauthorized applications.
Content filtering restricts access to web sites that are chosen to be of benefit to the business. 'Surfing the net' is the primary contributor to employee inefficiency.
Malware (viruses, spyware, phishing schemes, etc.) can be blocked by content filters thereby adding another layer of defense to server and PC based tools.
Traffic analysis provides for optimal bandwidth utilization. Network Support, Inc.'s analyzers can quantify the internet traffic in and out of your network. Why is this important? A client was suffering from a network slowdown. Server and storage response time was shown to not be the cause. Traffic analysis showed an excessively high volume of video traffic. The cause - a mother of two children had two live video feeds from her daycare open on her PC all day.
Although our perimeter defense and content filtering recommendations are based on network types, number of users, and additional services such as Virtual Private Networks - many companies can be adequately protected at a fraction of the cost that is normally anticipated.