Access Denied? Excellent - it means that logging on software is doing it's job! If this was all the IT director had to worry about then life would be simple. Back-door threats can be much more lethal and system managers have to be constantly vigilant for computer related acts of terrorism; stealth bombs such as viruses, worms, Trojan horses, hackers etc. Few, if any, can say they have never been subjected to an attack.
We can advise on and implement computer and network security solutions such as anti virus, firewalls, security audits, access controls and contingency planning. We always assume that whatever has or has not been done to prevent problems - they are going to occur anyway.
We have always called it good old-fashioned security and contingency/disaster planning but now national & international standards agencies have got in on the act and established an Information Security Standard ISO/IEC 17799 or BS 7799. Our systems meet this standard.
A fast, stable and secure network is essential in the daily internal and external process of your business. The ever-increasing speed of 'always-on' broadband connections combined with ACT's experience in network design and implementation will ensure your network meets your business' every demand. Our network installations will meet each of your business' requirements, with security guaranteed.
Firewall implementation is an absolute must for anyone with access to the Internet or sending and receiving data via a telecommunications line. Designed to stop unauthorised access to a computer or network, firewalls come in a variety of forms offering a wide variety of features, protection, scalability and cost.
It must always be remembered that firewalls can be jumped, so the aim is to make them high enough or wide enough to deter even the most determined of cyber criminal whether it be virus or hacker.
If you are looking for firewalls we can assess your requirements and research a variety of products to make sure you implement the package that best fits your needs.
Intrusion Detection (ID) systems detect inappropriate, incorrect, or anomalous activity on your computer(s). They can be host-based or network-based and the usual approach of these systems is statistical anomaly and pattern matching detection.
If your system(s) have been subject to intrusion you will be aware of the risks out of necessity and a study of these are helpful in framing the case for intrusion detection products. The cost of an intrusion may include:
- production downtime.
- sabotage of critical information leading to bad decisions.
- unauthorized access or theft of confidential information leading to the loss of a competitive advantage.
- expenses associated with investigation, legal, forensic and management reporting.
- negative publicity.
The installation of ID products depends on how secure you need to keep your information.