Web Filtering For Protection

The Internet has become an indispensable business tool, yet browsing the Web has never been more dangerous.

Attackers now utilise the Web as the primary means for delivering viruses and spyware. Users who visit sites that have been compromised can unwittingly download malware that can harm your business.

Our Web filtering solution is a fast and flexible cloud based Web security solution that protects your business from Web borne threats, such as viruses, malware, spyware and phishing sites.

Anti-malware layers block threats safely away from your network while URL filtering policies and Web traffic quota limits reduce Web misuse and help you protect company bandwidth.

Web Filtering Features:

  • Comprehensive defences against attack.
  • URL filtering and web policy engine.
  • Multi-layered protection.
  • Comprehensive reporting.
  • Roaming and remote worker support.

Benefits of Our Web Filtering Solution

Predictable costs and simplified management.

Enables administrators to create and enforce a Web Acceptable Use policy with rules based on content types and website categories.

Helps protect corporate bandwidth and productivity by blocking or restricting downloads of certain file types and placing time and volume limits on Internet consumption.

Penetration Testing And Vulnerability Scanning

Identifying the security weaknesses in your IT system enables you to take action to fix them before you suffer a breach.

Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.

A penetration test can help show how an attacker could gain unauthorised access to your IT infrastructure through your email systems, firewalls, VPN tunnels, web servers and other network devices. Knowing where you have potential security risks enables you to take action to mitigate them and prevent a possible attack.


Secure Network Authentication Access

Our secure two factor authentication solution provides powerful authentication to make remote access to your company network and sensitive data safe, but hassle-free.

As opposed to the standard password authentication, our two factor authentication solution uses two elements. These are “something that the user knows”, such as a password or a PIN code, and “something that the user has”, typically a mobile phone or hardware token. Used in combination, they provide greatly enhanced security for data access.

It is a mobile-based solution that uses two-factor, one time password authentication for accessing the company’s VPN and Outlook Web Access. The advantage of one time passwords is that they are randomly generated and can’t be predicted or reused.It is easy to set up and compatible with Android, Symbian and Windows phones, and any phone supporting SMS messaging.

The mobile application is a one-tap installation and is compatible with Android, Symbian and Windows phones, but is also compatible with any phone supporting SMS messaging. The application is also PIN protected to prevent fraud when lost or stolen. To install the software on the server it is a simple double-click installation and setup, the installer automatically recognises the Operating System and selects all suitable components.

Mobile Phone Virus Protection

Mobiles hold personal and often confidential information so it is essential that this data be protected at all times.

Our mobile security solution includes a firewall to prevent unwanted breaches and an enhanced security system that will delete sensitive information and prevent unauthorised access to your data in case of loss or theft.

Mobile Security Features

  • The on-access and on-demand scan will scan all the files on your device from wireless connections (Bluetooth, Wi-Fi, etc.).
  • The mobile security firewall works intelligently to allow you to monitor all incoming and outgoing communication based on a set of mobile security rules that you define to prevent unwanted breaches.
  • Mobile security doesn’t just protect you online, but also regulates your SMS/MMS, allowing you to pick and choose who your trustworthy contacts are through customisable black or white lists, or simply by blocking unknown numbers.
  • An enhanced security system will delete sensitive information and prevent unauthorised access to your data in case of loss or theft. The remote wipe feature works through SMS, deleting contacts, messages and any data stored on a memory card with one single SMS. Not only this, but if your mobile was to fall into the wrong hands, the SIM matching feature creates a list of trusted SIM cards for each device. In case of an unauthorised SIM card insertion, you are automatically notified by a text message containing the IMSI and telephone number, so you can locate the perpetrators.
  • Mobile security software can be used and has been tested on Microsoft Windows, Symbian and Android phones.
Page 2 of 3
BIGtheme.net Joomla 3.3 Templates