Small Office / Home Office (SOHO) Network Security Solutions
- Apprehensive about the security of your Internet connection?
- Concerned with the security implications of wireless network devices?
- Want to establish secure remote access to the SOHO network, or between partner networks?
- Contemplating other security initiatives?
Perhaps you have installed a broadband router, and have assumed that its default configuration provides adequate protection for your business' resources. It doesn't. The default configuration of a Network Address Translation (NAT) gateway / router or firewall provides some protection from intrusion by denying inbound connections from the Internet. However, all outbound connections are permitted, including those initiated by spyware and back door Trojan horses, unless specifically denied by careful configuration of your device. Many of these devices offer advanced security features (requiring configuration) that provide the ability to filter (permit or deny) connections based on addresses, port numbers (applications), time constraints, and content. Filters may be used to generate syslog messages that provide visibility into the activities occurring on your network.
Host (computer) based Internet security software offers complementary protection. These products typically incorporate some form of firewall functionality, and they help identify the presence of spyware and other malicious code by notifying the user when applications attempt to establish connections in the background. The effectiveness of these products can be hindered by the limits of a user's knowledge. Anti-virus software is an absolute requirement when interacting with the online world. But don't kid yourself, if your virus definitions are not current, you are exposed.
Endeavor Networks will implement a hardware firewall configured to permit the specific applications and protocols your business requires, or enhance the configuration of your existing device to protect your network perimeter from unauthorized access. We will install and configure security software if desired, discuss security policies and safe practices that will contribute to the protection of your business data, and mitigate the potential risks of your employee's Internet activities.
Although consumer grade wireless access points (WAPs) and routers do incorporate security features, most are not configured by default. If you have installed one of these devices, and have not specifically configured the wireless security features for your environment, you have inadvertently exposed your network resources to considerable risk. Individuals within proximity of your unprotected wireless network may access your network, attempt to compromise your computers, eavesdrop on your communications/activities, and fully exploit your Internet connection. These individuals may be your neighbours or transients (war-drivers) parked on the street. Exploiting unprotected wireless networks has become sport (war driving) for some. There are numerous websites detailing the locations of such networks.
If your existing wireless access device relies on the WEP (Wired Equivalent Privacy) security algorithm, and is not firmware upgradable to Wi-Fi Protected Access (WPA2), it should be replaced. WPA2 addresses a number of security vulnerabilities inherent in WEP. WPA2 offers numerous advancements, such as improved key management, AES encryption, and 802.1x user authentication.
Endeavor Networks will provide and install a suitable wireless access device or configure your existing device with a full implementation of its security features. Addressing the security issue will enable your business to derive the benefits of untethered access, while minimizing the risk.
Virtual Private Networks
If you or your employees are hindered by a lack of secure access to the business' resources while away from the office, then Virtual Private Networking (VPN) is the solution for you. Virtual Private Networks provides the ability to securely connect to a private network through an unsecured public network such as the Internet, using authentication and encryption methods. VPN will enable remote employees to access your resources in a private and secure manner, without compromising the security of your network. It may also be used to establish private connections between peer networks, such as business partners.
Endeavor Networks will provide and install a suitable VPN device, or utilize the capabilities of an existing device to protect your data and communications from tampering and eavesdropping as they traverse the Internet.
By providing secure access to the business' information and resources when needed, from wherever needed, you will enhance the productivity and effectiveness of your mobile workforce.
Other Security Initiatives
- Deploying a Public Key Infrastructure (PKI) for the provisioning of X.509 digital certificates, to enhance your VPN, or implement secure e-mail via S/MIME (Secure/Multipurpose Internet Mail Extensions)?
- Contemplating other security initiatives not described here?
Contact us. We may be able to assist you with your needs.
Why choose Endeavor Networks Inc.?
You will benefit from significant knowledge transfer as we guide you through your security options, and execute the most suitable solution(s) for your needs. Our documentation will help sustain your security posture, and contribute to a greater degree of self-reliance.