Search:  
 
Email to a friend    Print
I T   C o n s u l t a n c y   &   B u s i n e s s   S o l u t i o n s
Call: 1300 557 697
 Services 
 Solutions 
 Company 

Testimonials
Our computer systems are critical to our business success. CMI's Managed Service offering has significantly reduced the stress and wasted hours that inevitably occur when computers crash or play up.

Chesterton & Co Real Estate
Steve Chesterton
www.chestertonrealestate.com.au


More...

CMI recently upgraded several of our meeting rooms with new projectors, data cabling and electronic whiteboards. CMI managed the project and we are very happy and satisfied with the end result.

Directorate General Technical Airworthiness - Australian Defence Force
Patrick Waters
www.defence.gov.au/dgta/


More...


Home » Services » IT Security
IT Security

How secure is your network?

Security is often given a high priority by large organisations but many smaller companies have a weak security blanket. Through our experience, some companies do not even have that! The most common problem is a false sense of security perceived by a company. ?Someone configured a firewall for our company? is a common term used among such businesses. In some instances a company is operating with a direct connection to the internet, for instance a DSL router that offers very limited security capability and by no means is an adequate device to protect a business.

We are able to recommend, implement and maintain suitable hardware and/or software security systems that will give you a greater insight into your business and its potential threats.

We can implement the following security solutions:

Firewalls

Having your network protected from outside intruders is as essential as locking up the front door of your business. If the firewalling architecture is poorly setup or in some cases non existent it might have a significant impact on the business entity. If an intruder penetrates into your network it could lead to sensitive data being leaked out of your network and in some cases data loss.

We support and implement the following firewalls:

  • Watchguard
  • Smoothwall
  • Linux

SPAM

SPAM is known as the pest of the eGeneration and has companies counting the loss in productivity and financial losses. Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on to people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services.

We support and implement the following spam protection solutions:

  • Linux Spamassasin
  • Barracuda Spam Hardware Appliance
  • Watchguard SpamScreen
  • Cloudmark Server Edition
  • Trend Micro Spam Protection
  • Symantec Spam Protection

To determine the best SPAM solution for your company we will need to examine your network and propose the package that is most suited to your infrastructure. Most of SPAM systemscan be implemented without any interruption to your business.

Spyware

In simple, terms spyware are any programs that when installed on your computer, changes settings, displays advertising, and/or tracks Internet behaviour and report information back to a central database. Spyware is sometimes installed unintentionally by users along with other wanted software and can be very hard to remove. We support and implement the following spyware protection solutions:

  • NetIQ Solutions
  • Barracuda Spyware Appliance

Anti Virus

We support and implement the following anti virus protection open and closed source solutions:

  • Fsecure
  • ClamAV
  • Kaspersky AV
  • CA Innoculate
  • CA VET
  • McAfee
  • Trend Micro

Audits

Initially one of our experienced security consultants will examine and prepare a detailed report about your network infrastructure. A detailed security audit can give your business the peace of mind that everything is as secure as it seems. Alternatively, it can point out possible intrusion areas that might be exploited by an external hacker.

Basic guidelines for the security audit and analysis are:

  • Physical Security
  • Network Security
  • Protocols / Services
  • User Security
  • Data Storage Security
  • Passwords
  • System Administration


Virtualization
Unified Communication System
Software as a Services
Cloud Computing
Learning Management System