Protecting your assets from internal & external IT threats. The introduction of new technologies, along with the increasing sophistication of the threats, calls for a multi-layered, in-depth security solution.

Landust Networks designs & integrates effective multi-layered security solutions.

  • Antivirus / Antispam Solutions
  • Firewall Solutions
  • Virtual Private Networks (VPN)
  • Internal Security

The downside of new technology

Along with increasing reliance on the Internet and email, today’s small businesses are also embracing wireless mobility, instant messaging, and business-to-business applications. This makes good business sense but at the same time you also need to be aware they are accompanied by a certain element of risk.

Every new technology or device presents a new entry into your infrastructure, and could be used as a conduit for attack if steps are not taken to secure the technology as it is introduced.

Complex blended threats

Blended threats employ multiple methods to discover and exploit network vulnerabilities, and then are able to self-replicate and self-propagate. Blended threats like Code Red and Nimda took the worst characteristics of viruses, worms, and Trojan horses, and combined them with server and Internet vulnerabilities in order to initiate, transmit, and spread.

Blended threats are designed to exploit the vulnerabilities of security technologies working independently from one another which are why defense in depth is so crucial to protection of todays business.

Defense in depth components

“Defense-in-depth” means creating multiple layers of protection around your computers and data. Multiple layers of security help keep the compromise of one level from causing a general compromise of the entire network.

Layered Security Solutions:

  • Antivirus software

    Provides protection from files that come into the network via email, Internet downloads, floppy disks, etc. The antivirus software is setup to automatically check for newly discovered threats, periodically scan systems for those threats, and also watch in real time while new files are downloaded from the Internet or detached from email messages to make sure nothing unsafe gets through.

  • Firewalls

    Provides an important line of defense in protecting your network and all of its data by screening the information entering and leaving a network to help ensure that no unauthorized access occurs. Firewalls also help protect your computer against DoS attack, and also against unwittingly participating in one.

  • Virtual Private Networks (VPNs)

    Are vital if you or your employees are connecting to the office network remotely. VPNs secure remote connections beyond the perimeter, allowing for safe communication across the Internet.

Additional steps that we take to tighten your small business’ security:

  • Stay up to date on patching

    Be vigilant about checking for software updates to take advantage of security fixes and patches for holes that might leave you vulnerable to attack.

  • Create a security policy

    Outline your information assets and all access rights to that information. Remote access rules should be outlined here also.

  • Security awareness training

    Educate employees so they know their role in maintaining the security of your business.

  • Restrict and control network access

    If you have any temporary or contract workers who need access to your network, be sure to give them only the access necessary to perform their job and don’t forget to revoke their access entirely once their job is done

  • Enforce password policy

    Ensure that users change passwords regularly, and are careful to not post their user names and passwords out in the open.

Today’s threats are becoming more prevalent and more advanced in both their methods of spreading and the damage they cause. The threats’ complexity in both attack and propagation, paralleled by the growing complexity of the small business network, mean that single security measures are no longer adequate.

Landust Networks implements security measures on all vulnerable points on your system, including your servers and desktops, establishing a multi-layered, comprehensive line of defense, or defense in depth.