We receive a lot of enquiries from small business (SMB) and SME customers looking at ways they can enhance the security of their IT and network environment. We thought we’d share a Small Business Security Blueprint which provides advice, examples and suggested products that can enhance the security of any small business. Read more
Many businesses use WiFi to provide convenient, wireless access to the corporate network – but even with a network key, have you ever considered how secure the solution is? We look at the differences between WPA-Personal and WPA-Enterprise, and highlight why your business should really be using WPA-Enterprise. Read more
SD-WAN is a technology that enables the more effective use of your internet and WAN services. Features such as load-balancing, application steering and awareness – lead to savings, greater visibility and performance. In this article, we look at the critical elements of an SD-WAN solution, and they can benefit a small business or enterprise company. Read more
We regularly deploy IPS (Intrusion Prevention System) solutions for our clients at their network edge as part of their managed firewall solution. An IPS should be used by any organisations that do business online or operate within the financial services, legal, accounting, banking or healthcare sectors.
The majority of small businesses will already have a router, but a firewall is specifically designed to protect your network. With more complex threats, the functionality and features of firewalls and routers have evolved to include services such as intrusion prevention (IPS), antivirus, web filtering and anti-spam; often – all in one box.
With so many vendors, models and features, costs range from a few hundred pounds to several thousand – what represents good value? What does your business need? How much does a small business firewall cost? Read more
In previous articles, we have explained the benefits of internal network firewalls, also known as internal segmentation firewalls. The primary purpose is to secure internal network traffic, particularly between sites, functional areas or departments. Another common use is to provide an additional level of protection for sensitive areas of your network (i.e. databases, R&D) or high-risk areas (i.e. development environments, staging areas).