Network Security Solutions

btn_contactUnified Threat Management (in alphabetical order)

Firewalls (in alphabetical order)

Spam Filtering (in alphabetical order)

In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.

SonicWALL Network Security Appliances
SonicWALL Network Security Appliances

Network security starts with authenticating the user, commonly with a username and a password. Since this requires just one thing besides the user name (I.e. the password which is something you ‘know’), this is sometimes termed one factor authentication. With two factor authentication something you ‘have’ is also used (E.g. a security token or ‘dongle’, an ATM card, or your mobile phone), or with three factor authentication something you ‘are’ is also used (E.g. a fingerprint or retinal scan).

Fortinet-Product-Family
Fortinet Product Family

Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) helps detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network and traffic for unexpected (I.e. suspicious) content or behavior and other anomalies to protect resources. Individual events occurring on the network may be logged for audit purposes and for later high level analysis.

Unified Threat Management (UTM) is a comprehensive solution that has recently emerged in the network security industry as a comprehensive approach to network security management.

The advantages of unified security lies in the fact that rather than administering multiple systems that individually handle anti-virus, content filtering, intrusion prevention and spam filtering functions, organizations now have the flexibility to deploy a single UTM appliance that takes over all their functionality into a single rack mountable network appliance.

In theory, it is the evolution of the traditional firewall into an all-inclusive security product that has the ability to perform multiple security functions in one single appliance. The following diagram shows primary (blue) and secondary (red) threat protection provided by UTM devices:

Network-Security-Solutions-chevron

As an IT Consultancy, PTS Data Center Solutions provides traditional network security solutions (E.g. firewalls, VPNs) and integrated unified threat management solutions. With threat approaches becoming ever more complicated such as spear-phishing, new targets to attack as organizations begin to leverage cloud computing approaches, and requirements changing for SAS-70 compliance, to name just a few areas, PTS is prepared to support clients with sophisticated threat detection and threat mitigation techniques.

To learn more about PTS recommended Network Security and Unified Threat Management for enterprise network security, contact us or visit:

Unified Threat Management (in alphabetical order)

Firewalls (in alphabetical order)

Spam Filtering (in alphabetical order)

To learn more about PTS consulting services to support Data Center Consulting, Data Center Management, and Enterprise IT Consulting, contact us or visit:

Facebook
Facebook
Google+
Google+
http://computer-room-design.com/strategic-data-center-solutions/network-security-solutions">
LinkedIn
YouTube
YouTube
Pinterest
Pinterest
Instagram