Introduction to Security
There barely seems to be a week go by that a ransomware or hacking attack doesn’t make the headlines – we can’t change this, but we can help protect against it. As network security is advancing at an alarming rate, and when combined with new regulatory compliance legislation, the do’s and don’ts of cyber security policies may appear like a minefield. Partnering with Scan opens the door to the experts from brands like Checkpoint and SonicWall plus our team of consultants to allow you to understand your current network status, its vulnerabilities, how to address them and how to ensure you are protected.
Basic Level of Protection
Your firewall acts as a barrier between a trusted network – your business; and an untrusted network - such as the Internet. It controls access to the resources of a network by examining data packets through a positive control model, meaning only the traffic allowed onto the network is defined in the firewall policy; all other traffic is denied. Adding Intrusion Prevention System (IPS) functionality goes one step further using a database of documented malicious signatures to prevent known attack vectors from entering the network, and in many cases, the firewall and IPS have been combined in a single appliance to form a Unified Threat Management (UTM) box, including web filtering and anti-virus. This used to be enough.
Intrusion Prevention System
If an Intrusion Prevention System (IPS) is a control tool, then an Intrusion Detection System (IDS) is a visibility tool. Intrusion Detection Systems sit off to the side of the network, monitoring traffic at many different points and providing visibility into the security status of the network. The latest Next Generation Firewalls (NGFW) provide IDS functionality combined with ‘sand-boxing’ and zero-day attack prevention, by analysing network traffic on the fly by sending it to a cloud engine. As the most up to date threat profiles are constantly added to the various manufacturers’ cloud engines, the data packets will be checked against the most comprehensive threat information available, and will be held there (sand-boxed), and prevented from entering your network until they can be satisfactorily identified, and classified as safe.
Email Security protects against ransomware, business email compromise, spoofing, and phishing. It uses advanced threat intelligence and a multi-layered approach to protect inbound messages and sensitive outbound data. An email security appliance offers high availability email protection against the constant, dynamic and rapidly changing threats affecting email today, including scenarios where employees inadvertently attempt to bypass security using document transfer sites.
Cyber Security Services
In today’s connected business world with its inherent online security threats, every company will fall into one of two classifications - those who have suffered a cyber-attack, and those who are not aware they have suffered a cyber-attack. Our aim here at Scan Professional Services is to help you navigate through the minefield of Internet Security – what it is, what measures can be taken and most importantly – how secure is your company? Our services include:
- Security Assessments
- Security Audits
- Penetration and Vulnerability Testing
- Incident Response
- Data Leakage Prevention
Secure Network & Architecture Design Services
The Scan Professional Services team have many years’ experience in the fields of Secure Network Architecture and Design, working on networks of all sizes and complexity. Our consultants are able to use their expertise to help your company deploy or design your network in a secure way to ensure the highest levels of business continuity. Our services include:
- Disaster Recovery and Business Continuity
- Adaptive Multi-Layer Network Survivability
- Content Control Systems
- System Monitoring
- Secure Tool Design and Deployment