Firewalls, biometrics, authentication, ssl, vpn, ipsec, 3des, encryption, viruses, spyware, web attacks, content filtering. Does all this confuse you and cause you to scratch your head?
FIREWALLS & VPN
Firewalls and Virtual Private Networks protect your organization's digital assets from external threats while providing secure access. Icon Systems Inc. will work with you to find the right solution for your organization. Our firewall partners also offer VPN solutions as a dedicated appliance or as part of the firewall.
This is the process of encoding information in such a way that only the person or system with the key can decode it. The product suite we provide protects data and communications with strong, proven security. These solutions are used to secure emails and attachments, files and folders, and entire hard drives.
Uncontrolled web access can have a negative impact on individual productivity, network performance and your organization's bottom line. With web filtering you can actively monitor network use and abuse in your organization. These solutions include more than limiting unauthorized web surfing. These solutions will also protect your network from being exposed to Web based email, file downloads, IM, and P2P. More importantly these solutions decrease your organization's legal liability and significantly increase network and employee performance.
Traditional password authentication requires one factor to gain access to a system. With multi-factor authentication you are required to use multiple forms of authentication to gain access to a system. This can be in the form of biometrics, tokens, or smartcards.
INTRUSION DETECTION AND PREVENTION
This is commonly referred to as IDS or IPS (Intrusion Detection/Prevention System). This technology detects all types of malicious network traffic and computer usage that can't be detected by a conventional firewall. An IPS is typically composed of three components. First, there are sensors that generate security events. Second, there is a console that monitors events and controls the sensors. Third, there is a central engine that records events logged by the sensors. IPS can be network based or host based. Network based IPS monitors network traffic while host based IDS consists of an agent that monitors all activity on that host.
PENETRATION TESTING & VULNERABILITY ASSESSMENT
Security attacks can come from anywhere - outside hackers, internal users, branch offices, remote users, or business partners. Can you honestly determine how solid your existing security infrastructure is? Would you like an objective assessment of your company's security? The purpose of this is not to sell or recommend a security solution. The purpose is to provide an unbiased, impartial and updated report on your organization's vulnerabilities. To uncover any bugs, configuration changes, vulnerabilities or human error that could expose your network to hackers.