Network & Security
Our networking team consist of leading Network & Security certified engineers and solution team design, build and implement solutions that leverage the latest industry standard technological advancements to provide customers with reliable, manageable and secure network environments to conduct their business on.
Our Network Security experts have vast experience in deploying complex solutions that are minimally invasive to the existing setup of the customers thereby leading to a greater ROI and a far secure environment that helps customers manage traffic and have complete control over their networks and security.
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Unified Threat Management
UTM is used to describe network firewalls that have many features in one box, including e-mail spam filtering, anti-virus capability, an intrusion detection (or prevention) system (IDS or IPS), and World Wide Web content filtering, along with the traditional activities of a firewall. These are application-layer firewalls that use proxies to process and forward all incoming traffic, though they can still frequently work in a transparent mode that disguises this fact. However, if this uses too much processor time, the higher-level inspection can be disabled so that the firewall functions like a much simpler network address translation (NAT) gateway.
Intrusion prevention is a pre-emptive approach to network security used to identify potential threats and respond to them swiftly. Like an intrusion detection system (IDS), an intrusion prevention system (IPS) monitors network traffic. However, because an exploit may be carried out very quickly after the attacker gains access, intrusion prevention systems also have the ability to take immediate action, based on a set of rules established by the network administrator. For example, an IPS might drop a packet that it determines to be malicious and block all further traffic from that IP address or port. Legitimate traffic, meanwhile, should be forwarded to the recipient with no apparent disruption or delay of service.
Refers to any software, hardware or process that is used to combat the proliferation of spam or to keep spam from entering a system. An ideal anti-spam system rejects messages which are both bulk and unsolicited, letting pass those messages which are of specific personal relevance to the recipient (not "bulk"), and those which the recipient has expressly requested (not "unsolicited"). When phrased in these terms, spam filtering is obviously a task for a well-informed intelligent agent of immense sophistication—quite beyond our current ability to construct. Anything less is a weak approximation at best.
Antivirus is protective software designed to defend your computer against malicious software. Malicious software or "malware" includes: viruses, Trojans, keyloggers, hijackers, dialers, and other code that vandalizes or steals your computer contents. In order to be an effective defense, your antivirus software needs to run in the background at all times, and should be kept updated so it recognizes new versions of malicious software.
An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with a standard Web browser. In contrast to the traditional IPsec (Internet Protocol Security) VPN, an SSL VPN does not require the installation of specialized client software on end users' computers.
The SSL VPN can be a good choice for schools, libraries and public kiosks where trust can be an issue but easy access is also important. Applications include Web-based e-mail, business and government directories, databases for educational institutions, file sharing, remote backup, remote system management and consumer-level e-commerce.
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. In this context, the two factors involved are sometimes spoken of as something you have and something you know. A common example of two-factor authentication is a bank card: the card itself is the physical item and the personal identification number (PIN) is the data that goes with it.
On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers Content filtering usually works by specifying character strings that, if matched, indicate undesirable content that is to be screened out. Content is typically screened for pornographic content and sometimes also for violence or hate oriented content. Content filtering and the products that offer this service can be divided into Web filtering, the screening of Web sites or pages, and e-mail filtering, the screening of e-mail for spam or other objectionable content.
Encryption is a process which is applied to text messages or other important data, and alters it to make it humanly unreadable except by someone who knows how to decrypt it. The complexity of the algorithms used means that a strongly encrypted message might require thousands of years of processing by very fast computers to break the encryption. The most popular use of encryption is for securing web servers that are accessed by the https protocol not http so that data such as credit cards can be sent safely over the internet.
Two basic types of Encryption are commonly used:
Symmetric Encryption- Where a single secret key is used for both encryption and decryption.
Asymmetric Encryption- Where a pair of keys is used, one for encryption and the other for decryption.
Servers & Storage
Computer data storage, computer memory, and often casually storage or memory refer to computer components, devices and recording media that retain digital data used for computing for some interval of time. Computer data storage provides one of the core functions of the modern computer, that of information retention. It is one of the fundamental components of all modern computers, and coupled with a central processing unit (CPU, a processor), implements the basic computer model used since the 1940s.
Storage in popular usage differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers desired data using intermediate area in primary storage. Storage does not loose the data when device is powered down—it is non-volatile. Consequently, modern computer systems typically have an order of magnitude more secondary storage than primary storage and data is kept for a longer time there. Tertiary storage or tertiary memory, is a system where a robotic arm will mount (insert) and dismount removable mass storage media into a storage device according to the system's demands. It is primarily used for archival of rarely accessed information, since it is much slower than secondary storage (e.g. 5-60 seconds vs. 1-10 milliseconds). This is primarily useful for extraordinarily large data stores, accessed without human operators. Typical examples include tape libraries and optical jukeboxes.
Wireless & Networking
Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless networking is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices. Wireless is rapidly gaining in popularity for both home and business networking. Wireless technology continues to improve, and the cost of wireless products continues to decrease. Popular wireless local area networking (WLAN) products conform to the 802.11 "Wi-Fi" standards.
Backup is the process of copying a collection of data, the object, from "primary" to "secondary" storage for the purpose of recovery in the event of failure. Its complement is Recovery, the process invoked on failure or other requirement to return the contents of the collection to primary storage. To be useful for recovery, the source data image needs to be in a consistent state during the backup. The copy should provide a non-volatile point of retrieval. In addition, a data object may have multiple copies or recovery points. Failure causes may be logical, physical, accidental or intentional resulting in loss or inaccessibility of the original data.
The primary storage is typically disk. The secondary storage is typically magnetic tape, often called removable media because it is easy to transport to an alternate location. Today, disk/tape combinations and remote disks may serve as secondary storage in addition to other media forms. An alternate location or site is required in the event of primary site destruction or that the site becomes unavailable. In most cases, the legal or insurance test of backup "validity" requires a combination of the ability to recover from the media and physical storage of the media at a specified minimum distance form the primary site.
Virtual(rather than actual) version of something, such as an operating system, server, a storage device or network resources. Operating system virtualization is the use of software to allow a piece of hardware to run multiple operating system images at the same time. The technology got its start on mainframes decades ago, allowing administrators to avoid wasting expensive processing power. The idea is that virtualization disguises the true complexity of the network by separating it into manageable parts, much like your partitioned hard drive makes it easier to manage your files.
Server virtualization is the masking of server resources (including the number and identity of individual physical servers, processors, and operating systems) from server users. Network virtualization is a method of combining the available resources in a network by splitting up the available bandwidth into channels, each of which is independent from the others, and each of which can be assigned (or reassigned) to a particular server or device in real time.
Storage virtualization is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console. Storage virtualization is commonly used in storage area networks (SANs).