Your Image

Hardware Firewalls

Firewalls are network secrity devices or software that act as a barrier between trusted (internal networks within an organisation) and untrusted networks (i.e internet). The primary purpose is to control and onitor incoming and outgoing network traffic based on predetermined security rules. Firewalls play a cruciual role in protecting a network from unauthorised access, cyberattacks and potential threats. Firewalls are a fundamental component of network security, and they are used to create security policies that dictate which traffic is allowed and which is blocked. They are an essential part of any comprehensive cybersecurity strategy. Here is an overview of our firewall functions provided by our partner - WatchGuard:

  • Packet Filtering - packet inspection of network traffic compared with rule sets
  • Stateful Inspection - record of the state of active connections for more granular control
  • Proxying - Helps hide internal network structure and improve security
  • Deep Packet Inspection (DPI) - examination of packet contents for malicious
  • Application Layer Filtering - inspection of traffic at the Application Layer

Patch Management

Patch management is a critical component of cybersecurity and IT management that involves the planning, testing, deployment, and monitoring of software patches and updates to keep computer systems and software applications up to date and secure. It plays a crucial role in protecting systems from vulnerabilities and potential security breaches.

Patch Management process:

  • Identifying and prioritise vulnerabilities - as they are not all made equal
  • Patch Deployment and Testing - carefully planned and tested for compatability
  • Monitor & Report - detection of anomalies and visibility into the patch status
  • User Education - we make the user aware the importance of applying patches
  • Co-ordination with vendors & 3rd party softwares
Your Image

Vulnerability Test & Assessment

Threats come from outside and inside your network. Even if you have a firewall and patch management in place, you are constantly visible to intruders. They may not be able to get in at this moment, but they’re always looking toward the next. This means it’s good practice to test your security at regular intervals. Firewalls only work as well as they’re configured. That configuration must be updated to keep up with emerging threats. One update might be a simple change to one setting. But if your administrator allows incomplete updates to stack up, they’ll end up with a complicated task in a short period of time. If that administrator is replaced and leaves no documentation, the new person may not even know where to start.

Inside threats are different. They often get placed when someone finds a way to get them through the firewall. Malicious software can sit dormant for days or months and then activate on command. The key to preventing an outbreak throughout the network, or even a little data stream from heading out into the world, is containment. Unfortunately, it’s difficult to spot dormant threats (they are often stealthy by design). Fortunately, our tests confirm that when they become active, they won’t be allowed to go anywhere. Our efficiency allows us to test every machine on your network while your people continue to work. When a threat comes to life, it will open its eyes to an impenetrable cage.