Our in-depth, multi-layered approach to securing your organisation helps us to predict, detect, alert and respond appropriately to any threats.
Port scanning and filtering (firewalling): authorise and block protocols on a port-by-port basis.
Site-to-site encryption: gateway to gateway IPSEC encryption.
DMZ: host applications and control access to them from the public internet while defending against external attacks.
Intrusion prevention: monitor, log, identify and block malicious network activity.
Anti-virus and anti-malware gateway: protection from web-borne malware attacks with our Signature based anti-malware engine, with full inbound/outbound file inspection.
Anti-spam: inbound filtering engine that blocks spam and malware before it can clog your network.
Safe search: automated filter of illegal and offensive content.
Web filtering and application control mechanism: block access to harmful or inappropriate websites and applications. Defend against phishing/pharming attacks, malware, spyware and objectionable content that can expose you to legal liability. Identify and control applications on networks and endpoints regardless of port, protocol and IP address used.
Anonymous proxy blocking: stay aligned with your Acceptable Internet Usage Policy.
Data leakage prevention: ensure users don’t send sensitive or critical information outside the network with pattern matching techniques that detect and prevent sensitive information and files passing through the network perimeter.
Remote access with two factor authentication: secure your data on the move and in the office with encryption, ensuring that data can only be accessed by authorised users. Using end users’ mobile devices as their mobile token then acts as a second layer of authentication.
Advanced threat protection (ATP): protect against zero-day and other sophisticated targeted attacks. This sandbox protection service detects, analyses and evades advanced attacks designed to bypass traditional defences (targeting specific people or functions).