- Virus Protection At The Network LevelAll Internet traffic entering your network undergoes a virus scan that first filters through a known database of over 80,000 viruses, worms and other malicious code definitions.
- Aliz
- Anset
- Anti700
- Apbost
- Aplore
- Apost
- Badtrans
- Benjamin
- BogusBear
- Breetnee
- Bride
- BugBear
- Carewrm
- Cervivec
- Cian
- CIH
- CodeBlue
- CodeRed
- Coolnow
- Cuerpo
- Cult
- Cydog
- Datom
- Donghe
- Duni
- Eiram
- Elkern Enemany
- Ethan
- Fbound
- Fizzer
- Fortnight
- Fosforo
- Frethem
- Funlove
- Ganda
- Gibe
- Gigger
- Gokar
- Gone
- Gruel
- HappyTime
- Holar
- Idtsys
- Invalid
- K0wbot
- Kagra
- Kitro
- Klez
- Kriz
- Led
- LFM
- Lioten
- Lirva
- Lolol
- LoveGate
- Loveletter
- Magistr
- Manymize
- Melare
- Moe
- Msblast
- MyLife
- Myparty
- Netsky
- NiceHello
- Nimda
- Nocan
- Noclose
- Offensive
- Opaserv
- Palyh
- Pibi
- Prolin
- Qaz
- Rachel
- Randon
- Rede
- Refoav
- Rexli
- Rezak
- Rodok
- Sasser
- Scalper
- Sircam
- Slapper
- Sobig
- Spida
- SQL Slammer
- SST
- Stream
- Supova
- Swen
- Tattona
- Updatr
- VBSWG
- Vote
- Weird
- Yahaa
- Yarner
- Zacker
- Zoher
- As every computer on your network is at risk, security precautions must be at the network level.
- Protecting Your Network Against Intruders.Most hackers aren't attacking specific networks, but instead scan the Internet for vulnerable networks. Hackers don't care that you're a big or small business. Your open door provides them opportunity for bragging rights in the hacker community.
- Did you know? Computer security breaches are rising 20% per year. Less than 1% of all computer intrusion cases are detected. Of those detected, 40% detected system penetration from the outside. Only 34% of detected cases are reported.
- Protecting Your Network Against IntrudersAlthough a firewall is an effective method for enforcing network security policies, more often than not, the policies are inflexible and consequently aren't enabled. The result is firewall ports are enabled to allow daily business to be conducted, opening the door to hacker attacks. Consequently your network needs more than just firewall protection. You need intrusion detection and prevention. Intrusion Detection and Prevention System performs real-time traffic analysis and logs detected intrusion attempts on your network preventing their entrance. SNAP VPN performs protocol analysis, content searching & matching that can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, Small-Medium-Business (SMB) probes, OS fingerprinting attempts, and much, much more.
- You can ensure that limited bandwidth is reserved for approved activities while minimizing liability risks and lost productivity of misuse or abuse of the Internet.
- Protecting Your Network Against IntrudersOur ClearPath solution maintains and updates data tables with over a million URL addresses classified by category type. These definitions and all future updates are incorporated within each subscriber's service.
- White List filteringweb access is restricted to specific URL addresses.
- Black List filteringfree web surfing access, except to specific URL addresses.
- Usage limits by the time of dayexample: during regular business hours.
- Usage limits by how much time per dayexample: limit personal surfing to 1 hour per day.
- Wildcard key word blockingexample: block all sites with "sex" in the address.
- Flexibility to establish rules at individual user level, or by user groupexample: managers provided wider access.
- Block downloads by file typeexample: exclude .MP3 downloads.
- By not having the ability to host distributed applications, productivity enhancements are impacted, optimization of business processes are diminished, and competitive advantages are lost.
- Virtual Private NetworkOur ClearPath solution maintains and updates data tables with over a million URL addresses classified by category type. These definitions and all future updates are incorporated within each subscriber's service.
- Appliance-based solutionwhere virtual private circuits (VPCs) or tunnels are run over shared Internet access lines; as the data is sent over the public Internet data must be encrypted to maintain security.
- Network-based solution(ex: frame relay hub and spoke network), which is ideal for larger enterprises who require a dedicated connection with larger bandwidths to run mission critical applications, especially when a Quality of Service is required.
- Software-based servicewhere a thin client is installed on a PC that is run each time a secure connection is required. This type of VPN will also establish a secure connection through use of a virtual private circuit and then encrypt the data prior to transport. This service works well for mobile employees who can't bring a router or encryption appliance with them each time secure access is required.
- Technology Consulting
- Computer troubleshooting and repair
- Networking setup and configuration
- Database integration and management
- Data Backup/Recovery
- E-Mail / Microsoft Exchange
- Firewall protection
- Software installation / upgrades
- Spyware / virus removal
- Hardware replacement
- Network cable/router/wireless setup
- Network Administration services
- Preventative maintenance
- Printers and Fax Services
- Remote access/Internet / Intranet access
- Workstations installation,upgrade & repair
- On-call Support