NETWORK SECURITY & DESIGN

NETWORK SECURITY

Different companies have different security needs from a firewall. The security varies from an essentially open network for an ISP, which prohibits destructive activities, to tightly, sequestered corporate intranets. Our team of network engineers and experts will follow PC Centre’s Consulting Methodology to design and implement a firewall that meets your security requirements.

ASSET SECURITY

Our team will define in detail what assets require protection and where they are located producing security requirements document. Once the security requirements are validated the team will then review in detail your company’s security policy. A security specification document will then be created that addresses all security requirements according to the company’s security policy. From the security specification the PC Centre team will work with you to select the best firewall software and hardware. If your company doesn’t have a formal security policy PC Centre can work with you to develop one as a separate engagement

SECURITY POLICY

A security policy is a comprehensive policy, which covers everything from asset protection and what access needs to be restricted to the appropriate responses to various security issues. A security policy can cover external security issues, internal security issues, or both. Once the proper firewall has been selected and delivered the PC Centre team will build the firewall solution according to the security specification.

How UTM secures the network

A single UTM appliance simplifies management of a company’s security strategy, with just one device taking the place of multiple layers of hardware and software. Also from one single centralized console, all the security solutions can be monitored and configured. In this context, UTMs represent all-in-one security appliances that carry a variety of security capabilities including firewall, VPN, gateway anti-virus, gateway anti-spam, intrusion prevention, content filtering, bandwidth management, application control and centralized reporting as basic features. The UTM has a customized OS holding all the security features at one place, which can lead to better integration and throughput than a collection of disparate devices. For enterprises with remote networks or distantly located offices, UTMs are a means to provide centralized security with complete control over their globally distributed networks. With the expereience and resources, PC Centre is able to bring the latest of technology to the people who are serious about there company data and security.