Access and Protect Your Corporate Voice and Data Across All Networks

Unified Threat Management in Voice and Data Networks

“Networking” is simply the means and mechanisms connecting all of your computers, printers, computing devices, voip phones and systems monitoring devices together and to the Internet. Your network might comprise a few office computers or hundreds of computers in offices all around the world. Rest assured that we can handle either end of this spectrum.

Both the data network size and capacity and the robustness of the Internet connection must be driven by software concerns. The more complex your computing needs become, the more serious consideration needs to be focused on both network software and hardware configurations.

Applications may reside in several places, although they are all rendered and interacted with on your PC. An application can reside on a local desktop or laptop computer, on a local in house server, on an application service provider’s servers in a data center or in “the cloud.” The location where the application resides as well as the design of the application, defines the “network architecture” needed for the application to run correctly.

For the most part, you can just plug and play most inexpensive consumer firewall/routers. The least expensive firewall/router generally has a built in 10/100/1000 MB switch with five ports. They arrive configured to work out of the box. Although the default settings might get you started, they are not the optimal way to configure a network. They beg the question; do you really want a cheap consumer firewall/router controlling and ultimately bottle necking your company’s expensive technology investment?

You would be wise to consider a more expensive commercial firewall with more capacity and features. The least expensive devices are good for email and Web surfing in a three or four person office, but not much else. We can setup the correctly configured and sized firewall/router for your unique business.

Wireless, besides being the current expectation, requires careful consideration and your business can benefit from well planned wireless network access. Costs and exposure can add up fast without the proper wireless deployment. Read this SonicWall case study to learn how Hall County Schools futureproofed their IT infrastructure and saved up to 50% in costs.

Wireless is nice, but you will need wires to gain the network speed that modern locally installed applications need to work correctly. Modern desktop and laptop computers come with gigabit network functionality built in to the systems. Why mess with a 54-megabit wireless connection when you can have a wired gigabit connection.

Network security remains a huge consideration for your company’s network. A brand new infected web page is discovered every 14 seconds. Only a Unified Threat Management (UTM) device can protect and mitigate your network’s Internet gateway risk against today’s modern web-based malware and security threats.

The web has become the key vector for online attacks – yet the vast majority of businesses are unprotected against today’s modern web-based malware, even with currently licensed desktop security software. Today’s rapidly evolving web threats and the instant exploitation of any vulnerability by malware authors means that you need to build an impenetrable wall around your network.

Network security for any network attached to the Internet deserves your strongest consideration. Once a port becomes open on a cheap consumer firewall or in consumer firewall software on a pc, without the traffic through the port being subject to monitoring and remediation, a severe security risk exists. The fault can lie with the remote access software installation routine or whomever opened the port on the physical firewall. Unfortunately, courts generally decide on fault.

When we do remote access with any product, we make sure that a Unified Threat Management device sits between the local computer/network resources and the Internet. We do the same when working with networks that have credit card functionality inside them, like a small store or restaurant to help maintain PCI compliance.

Both SonicWall and Cisco have good videos on the subject. Learn how UTM can help your business; from Cisco or SonicWall

The cost of these devices for a very small operation generally runs under $500. If you’re technically sharp, you can do it yourself.

Reap the benefits of UTM. Purchase a SonicWall Network Security Appliance for your home office or small office.

We can help. When you need our assistance, have questions or want to discuss your business, please click here to call, text or email us.