Network Security
Network security has become increasingly more difficult to manage and evaluate, even as industry and government compliance requirements have become more demanding. The network threats are real, and costly internal and external vulnerabilities can cause business disruption, loss of revenue, or loss of operational efficiencies. Because network security can be breached from both internal and external sources, traditional perimeter firewalls are not enough to protect the network.

NLE provides new network security tools, network appliances, and professional services to secure networks large and small. NLE has identified these key components of network security that are now needed in all organizations:
  • Managed Services Offering
    • Your business plan probably did not include becoming expert in Cyber-Security, PC/Server Management, Regulatory Compliance, and Disaster Recover. But even small businesses are impacted by critical data security threats and technology maintenance hurdles that detract from the core business goals.

  • Unified Threat Management (UTM) Firewalls
    • It is too costly and operationally inefficient to add-on each separate component as security threats emerge. Today's solutions use multiple scanning methods and multiple defense layers in high-throughput appliances. IDS/IPS, Anti-Virus, Content-Filtering, VPN, Anti-Spam, P2P control, etc. all needs to be included in a network security solution.
  • Network Access Control (NAC), or ROLE-based Networking
    • Creating differentiated network services based on individual access requirements is the key to regulatory compliance. The era of every user's ability to browse to all network resources should be over. Role-based networking is required to limit visibility to networks, servers, and TCP/IP ports and protocols, regardless of the user's point-of-entry into the network.
  • Mobile Computer Client Protection
    • Also referred to as "Mobile NAC", all network devices that can leave and join the network need to have accountability and control regardless of location. The ability to control laptops, PDA's, and other mobile devices when they are not connected to a VPN session is a key requirement.
  • Event Correlation and Log Analysis
    • Security threats cannot be stopped by reviewing logs in "post-mortem" analysis. To stop "zero-day" threats, the network needs event-correlation and adaptive-response tools. While SNMP report tools still serve an important purpose for network engineers responsible for network health, other tools are required to correlate client, server, and firewall activities with computer application processes.
  • Layer-7 (Application Layer) Visibility and Packet Analysis
    • The ability to classify all applications regardless of port and protocol is essential for both security and performance analysis. In-line devices for analyzing and reporting network traffic across all OSI layers are essential for compliance, security assessment, and resolving performance issues. Server virtualization also introduces the need for monitoring tools to review traffic between two virtual servers.
NLE provides solutions for all of the key areas of network security listed above.
Subcribe to Newsletter