One of the biggest concerns we face daily, as we analyze networks, is that most are running on ‘consumer’ grade hardware and ‘consumer’ software to protect their networks and more crucially their data. Two of the most critical elements of ones business is being protected by ‘off the shelf’ hardware and software. Do you put your cash in a box and lock it in a drawer with a little lock, or do you take it to a bank and put it in a vault.
You may think the analogy is way off, but it is so much the truth. You are most likely putting way to much faith in that little lock, or hardware, that you have protecting your network. In today’s world, that just isn’t good enough unless you want to leave the door open and become a victim.
The second security issue that we see is with the adoption of wireless. Whether you provide wireless access for your customers, or your employees are you aware of how vulnerable both your network and data are. If you haven’t taken extra extra steps or precautions it is only a matter of time before you find out how dangerous you have left yourself. And don’t be fooled by the ‘username’ and ‘password’ as protecting you. Once you give that out, you have given out your key. If you want or need wireless, and are using ‘consumer’ grade hardware, my bets are you have a gaping hole in your security.
If you had to protect you office, would you rather build solid wall around your building with only one way in and one way out, or hire team of security personnel to protect you home from within. My guess is that you would select the former, but only have the later. Don’t be too alarmed, as I said at the beginning, you are not alone as not so long ago, that was completely adequate. But times have not changed, they have drastically changed when it comes to protecting your network and data. And if you do not want to become a statistic, now is the time to take a look at what you have and what you can do to protect your network, your data and ultimately your business.
As the need for increased security has grown, the development of business class UTM (Universal Threat Management) devices have made their way into the market. Now, what was once available only to the larger enterprise is now available to you without breaking the bank. With it comes many additional features, such as remote connection and secure wireless. We have partnered with Sonicwall, one of the largest enterprise security manufacturers. They provide many lines of devices to fit the needs of any size business or enterprise. Their TZ line of UTM products is designed for small to large business
Any small stand-alone business can use the TZ device as the primary network gateway, connecting users on the LAN and WLAN to the Internet. In addition, built-in IPSec and SSL VPN capabilities allow employees to login and work remotely, and multiple home offices can be joined to the corporate network using site-to-site VPN. The deep packet inspection architecture provides complete protection from today’s content based threats. If your business has multiple locations, you can use this same technology to connect to your remote locations, tying all sites together for maximum efficiency. Here is are some of the features of the TZ line of products.
Enterprise-class security at a small business price.
We can provide you state-of-the-art, comprehensive security that is both affordable and easy to implement. Too little security can be worse than no security at all, and the small business that simply implements any minimal firewall and forgets it, often has a false sense of security and more often than not, falls victim to unexpected attack.
Layered protection.
Ideally suited for the SMB market, the TZ line features a compact form factor and an easy-to-use interface. Its sheer power transcends its small size, and users are able to enjoy true layered security with integrated gateway anti-virus, anti-spyware and intrusion prevention for real-time protection against a wide array of threats.
The TZ family of appliances, gives small business users a streamlined web-based GUI, easy-to-use configuration and management tools, and wizards to guide you through the configuration process. Both wired and wireless appliances are available to meet every possible configuration requirement.
Secure content management.
Content-based threats are a constant problem for businesses of any size, and SMBs are vulnerable to the same types of attacks that the largest enterprises face. Secure content management keeps your network free from harmful content. As part of this protection, e-mail security also keeps your e-mail inboxes free from virus-laden e-mails, SPAM and phishing attacks through a combination of technologies that improve response time and ensure full protection—all the while delivering superior performance and no delays.
Wireless networking
The TZ line of devices make your wireless LAN as safe as your wired network. With Unified Threat Management, deep packet inspection and VPN technology, you can implement multiple zones of access (for both wired and wireless users) while maintaining total control over what’s being accessed by whom on your network. The wireless appliances deliver the same gateway content protection as wired solutions, with integrated anti-virus, anti-spyware and intrusion prevention.