Security Consulting

Sub Categories

A single breach in corporate network security can leave a company wide open to identity theft, intellectual property theft and even total loss of business capabilities. Netlink Group have a proven track record in providing and deploying enterprise class security solutions designed to integrate with your existing work processes and protect your data.

We believe the Four key areas of protection that need to be covered are:

1. Network Protection & Management 

netlink6

Identity management – Netlink Group provides a wide array of innovative solutions which combine the best of innovations in the security industry that securely issue and manage digital credentials on devices, as well as securely update applications and credentials on devices after they have been issued to end users.

Intrusion Detection & Prevention – Having an intrusion prevention system can stop known attacks, and often can give warning of zero day attacks. Breaking into a site with a well maintained intrusion prevention system is beyond the skill of most hackers – including experienced penetration testers.

However, installing an Intrusion Prevention system is not quite as simple as plugging it in and turning it on. Poorly configured Intrusion Prevention systems can cause slow network access, stop legitimate traffic and create endless alarms.

Netlink Group’s Managed Security can offer your organisation a very effective defence that requires minimum maintenance, while providing you reports that show where the threats are coming from, and what they’re trying to get to. This can provide you strategic information to better secure your network in the long run.

Network Access Control – With increasingly complex networks in use today, it is important to secure those networks thoroughly. The solution is network access control (NAC), which is a type of computer network security that attempts to unify endpoint security technology (such as anti-virus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

Netlink Group’s network security solutions control access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, our network security solutions discover and evaluate endpoint compliance status; provisions the appropriate network access and provides automated remediation capabilities.

Perimeter Firewall & VPN – Determining the type of firewall best suited to your organisation requires a strong understanding of your business requirements and information security principles to provide the best network security and hacker protection. Firewall types include application proxying, deep packet inspection, layer 2 bridging, and packet filtering.

Additionally, modern effective firewalls have also evolved to include further security features such as:

  • Application intelligence;
  • Authentication systems;
  • Intrusion detection and prevention;
  • Traffic shaping and management, and
  • VPN termination.

The increasing demand for faster inter-office communications and need to share data across sites, together with the facility for offsite data backup, security cameras and Voice over IP (VoIP), has provided even more potential security vulnerabilities.

What would a network security audit reveal within these areas? Our specialisation in information security provides a strong background for assisting you. Get in touch with Netlink Group who will provide you with specialist advice on installing a firewall suited to your business’ needs.

 SSL VPN – Clientless Remote Access –   The SSL VPN device uses the Secure Socket Layer or Transport Layer Security protocol to decrypt data and forward it through the SSL tunnel using specialised hardware. It helps connect individual users to corporate resources. Traditionally, SSL is only used to encrypt web browsing traffic, but clients can now send traffic other than web browsing through the SSL tunnel. SSL VPNs use Secure Socket Layer for data confidentiality, integrity, and authentication when the remote user connects to the corporate resources and extends this functionality to client/server applications as well as web traffic.

SSL VPN has the following advantages over IPSec:

  • Supports full clientless access directly through web browser facilitating anytime, anywhere remote access
  • Granular control of users and policies
  • SSL VPN can fall back to traditional IPSEC for flexibility
  • There are many situations where the IPSec will be unable to connect (e.g. hotel)
  • IPSec VPNs were found to be costly to set up and maintain
  • High availability through clustering of active/passive, active/active environments
  • Platform is designed to be secured, by using encrypted file system, hardened applications and restriction of access to the underlying OS

Need some help deciding on which SSL VPN solution is best for your business? Why not have a chat with one of our security consultants at Netlink Group to learn more about the market leading SSL VPN solution.

Vulnerability Scanning & Management – For organisations that prefer to manage security operations in-house, Netlink Group offers vulnerability management solutions that conduct automated and continuous scanning to identify potentially damaging vulnerabilities in your network infrastructure.

Vulnerability management is an on-going process that protects your valuable data, customer information, critical network assets and intellectual property. Our solutions are designed to identify vulnerabilities quickly and accurately, as well as provide remediation steps and blocking techniques.

Netlink Group vulnerability management solutions track and communicate risk reduction efforts from initial identification through remediation. Vulnerability management is a key component of an effective information security strategy, which provides comprehensive, pre-emptive protection against threats to your enterprise security.

 

2. Data Protection & Management

netlink8

Data Encryption – Most people know that it’s more than just the physical hardware; that the data is valuable as well. However, most people don’t know exactly how valuable that data is. For example, when you lose a Windows based laptop, you’ll also lose the user’s domain password (cached), the password of the last 10 people to log on – possibly even a domain admin, all email – even if email is stored on the server the confidentiality is compromised, all files recently opened – Even if those files were encrypted on a server drive, the key to every wireless access point ever used, and any remembered data in browsers – such as banking passwords, addresses, credit card numbers.

We don’t think of this data because we don’t see most of it – but for performance and ease of use reasons, Windows keeps a copy of pretty much everything you’ve used, opened or visited. The effect of a laptop theft could be devastating.

You could use file encryption and file system encryption to make it more difficult to retrieve some of this data, but it can be difficult to manage – and can especially cause problems if an employee leaves or forgets their password! It’s also not entirely secure. Operating systems can be cracked offline, completely bypassing the encryption.

The answer is centrally managed whole disk encryption. This type of encryption replaces the Windows bootloader, and encrypts everything – including the Windows kernel, making offline compromise of the operating system extremely unlikely.

Integrating tightly with Active Directory, user management is easy – when the user changes their password, their encryption password changes too. If the user forgets their password, an administrator can unlock the computer for them.

If you need further security, Netlink Group can design and implement encryption systems that can automatically encrypt email – managing encryption keys, and even auto-enrolling third parties into the system. We can even include file server encryption, preventing the retrieval of data if a file server is stolen, or compromised remotely. Without the correct key, even domain admin rights don’t help a hacker get access to protected files.

And unlike earlier solutions, encryption has become nearly transparent to the end users. There is no need to manage keys, repeatedly enter passwords, or manually encrypt or decrypt anything. All this is managed by policies set by the administrator.

If you believe you have data worth protecting – and remember passwords and history is data that can be stolen, then it might be worth talking to us about how to protect that data.

Data Loss Prevention –  Hacker protection is all very well and necessary, but what are you doing to reduce business risk resulting from data leaking from your network? Information leaving your network creates more danger to your business than the damage caused by what is coming in.

Data loss can happen anytime, anywhere; whether from an employee sending data out with an e-mail message, or simply by plugging in a USB flash drive and copying the data. A typical scenario is a resigning employee copying company assets for personal or malicious use. Data leaks can come from:

  • Blogs
  • Desktops, for example CD drives, USB flash drives;
  • E-mail attachments;
  • FTP;
  • Instant messaging;
  • Smart phones, and

Laws that make your business liable for data protection, governance and privacy have made it even more essential that you plug the leaks.

Step 1 – Define your data types;

Step 2 – List all possible actions on that data;

Step 3 – Compile a policy, and

Step 4 – Speak with Netlink Group today and we can work out a solution, with you, to protect your valuable company assets, confidential data and customer information from accidental and/or deliberate disclosure.

Database Security & Auditing – Your organisation relies on data on a daily basis to make decisions and perform its regular functions. This makes data the most important thing for an organisation. Content Security’s database audit services involves observing and auditing databases in order to be aware of the actions of database users and operations that take place. This is to ensure that information is not accessed by those without the permission to access it.

Netlink Group can provide a complete audit of your database infrastructure and provide recommendations to improve your security and compliance. Contact us today for more information.

 

3. Device Protection & Management

netlink11

End Point & Gateway Security – Your goal should be to reduce costs and losses due to security incidents.

Think your end points are secure? Is your vulnerability management plan up to date? Maybe it is probably time to think again. Malware is an epidemic of such proportions that it costs global businesses billions of dollars annually in the costs of disruptions to business.

So, don’t ask, “Will I be attacked?”-but, “When will I be attacked, and how much will it cost?”

Statistics show that every year;

  • 65% of end points get infected;
  • Significant costs are incurred cleaning those end points;
  • Significant downtime and costs are lost in employee productivity, and
  • The number and costs of security breaches rise substantially year on year

What malware detection and malware protection do you have installed? How often are they updated? Many organisations run malware tests only and that too infrequently. This can pose a major threat when malware lifetimes can be measured in minutes.

Netlink Group can secure your endpoints from the most sophisticated attacks by comparing e-mail, file and web threat intelligence. Take a Netlink Group Malware Assessment today to find your weaknesses and points of exposure to malware infection.

 

Mobile Device Security & Management – The explosion of mobile devices and tablets has led to a revolution in the way we manage data. With the number of advantages that mobile devices bring, there are also a number of security concerns – the integrity of mobile devices and the data that is stored on them is an important factor that needs to be managed.

Netlink Group offers secure mobile device management solutions that secure, monitor, manage and support mobile devices deployed across allow your organization. This means that your IT department can streamline device management and focus on the business. We offer solutions that combine data-driven mobile device management with real-time wireless cost control.

Netlink Group has significant expertise and experience in mobile device management. Our mobile device management services, coupled with the leading MDM tools, are used by enterprises in diverse industries to manage smart-phones, tablets, and rugged devices. We support all the major mobile platforms that enterprises deploy – Apple iOS, Android, RIM, Windows Embedded Handheld and Windows Mobile.

 

Patch Management – The increasing need for vulnerability management and malware protection has highlighted the need for a strong focus on patch management.

“Unfortunately, software vulnerabilities are such that after a patch is installed today, a new vulnerability must be addressed tomorrow.” (Microsoft Patterns and Practices)

A patch management process must include:

  • Automated detection of missing security patches;
  • Assessment of the risk(s) involved if a patch has not been installed;
  • Upload of the relevant patch if a vulnerability is not already being addressed;
  • Change management-vital to every stage of the patch management process;
  • Testing patches to validate their impact on your production configuration;
  • Roll out patches;
  • Audit and assessment, and,

Some of the major benefits, to you, of implementing Netlink Group’s Patch Management are real time visibility and control-capable of managing hundreds of thousands computers; fixed or mobile, located anywhere in the world, on public or private networks, simultaneously and in real-time, without the need for servers or management resources; Benefits also include scalability-actions executed locally on each endpoint, in parallel, across the entire network, no server bottlenecks, and support for multiple platform environments and topologies-desktops, laptops, servers; Linux, Macintosh, Windows.

 

Virtualisation Security – Virtualisation software allows you to run multiple operating systems on a single machine at the same time. Virtualisation technology is gaining popularity due to the benefits it offers in terms of reduced costs and increased operational efficiency and flexibility. However, this technology introduces a virtualisation layer that itself becomes a potential avenue of attack for the virtual services being hosted. Because a single host system can house multiple virtual machines, the security of that host becomes critical in maintaining the confidentiality, integrity and availability of your systems and data.

In our experience this immature technology is often poorly understood, and rarely implemented correctly in enterprise environments without jeopardising the organisations security position. There are a number of security considerations which differ from the physical world, including but not limited to:

  • network architecture
  • zones of trust, network segmentation, and access control
  • virtual switches and networking
  • virtual appliances
  • mobile servers
  • patch application and management
  • intrusion detection and prevention
  • definition of roles and responsibilities
  • storage

Contact Netlink Group to speak to a Virtualisation Security specialist to help your organisation get secure in your virtual environment.

 

4. Web Protection & Management

netlink7

Email Security & Encryption – One of the most common means of communication in this century is the ubiquitous e-mail message.

As a consequence today’s business needs easy to use e-mail protection that doesn’t take hours per week to manage in order to ensure confidentiality, protect branding, and comply with laws that require e-mail messages to be digitally signed and encrypted.

Wouldn’t you like a flexible architecture that gives you the levels of protection you need now, but enables you to add more modules as your security needs change and grow?

Netlink Group can supply you with e-mail protection applications that will give you all these, and more. Their strategy ensures that all users comply with your enterprise privacy and security policies without the need to install client software on desktops.

 

Install an intelligent, automated email encryption and policy-based routing solution that:

  • Automates and confirms delivery of sensitive information for compliance and auditing;
  • Enforces enterprise messaging security policies for all internal and external users;
  • Ensures confidentiality and authentication for any user, regardless of the messaging infrastructure;
  • Has true message recall;
  • Requires no additional IT staff to manage users, and
  • What’s more, will leverage your existing investments in PKI and identity management solutions.

Netlink Group can supply and support you with a product that is positioned in the Leader’s Quadrant of Gartner’s Magic Quadrant for E-mail Encryption.

 

Web Filtering & Threat Management – The Internet is bringing boosted productivity to the business world, but the free-for-all nature of the Internet has also introduced new and badly understood threats for businesses. These threats include:

  • Legal Threats;
  • Network Threats;
  • Productivity Threats, and
  • Security Threats

Does your network security manage these threats without impacting productivity?

What’s more, the use of instant messaging (IM), peer-to-peer (P2P) programs, and social networking (Twitter, Facebook) contend for employees’ time and can result in a major shortfall in productivity.

Content Security offers you easy to use and affordable products that will protect you from email, Web and IM threats; increase employee output; optimise network use and mitigate any legal liabilities.

Netlink Group can supply you with a solution tailored to your business needs and environment that:

Gives you proactive protection;

  • Grants you control;
  • Keeps you informed;
  • Let’s you be efficient, and
  • Supplies you with filtering that suits your needs.

Success is due to Netlink Group’s Network Security Services ability to deliver easy to use, comprehensive solutions that would solve the most serious issues facing your network without unnecessary add-ons, maintenance, or lengthy installations.

 

Web Application Firewall – A Web Application Firewall protects Web applications and sensitive data against sophisticated attacks such as SQL injection, Cross-Site Scripting and brute force attacks, stops online identity theft, and prevents data leaks from applications.

Netlink Group provides a dedicated solution which uses specific technology to understand how the Web Application works and what is the true genuine usage of the application as opposed to a malicious attacker attempting to manipulate and gain unauthorized control of it. With Netlink Group’s Web Application Firewall, you have a worry-free assurance about your web applications.

A Web Application Firewall (WAF) is a dedicated solution which uses specific technology to understand and automatically learn the structure, elements, and expected usage patterns of protected Web applications in order to determine unacceptable behaviour and prevent malicious activity with pinpoint precision.

Accurate Web application security requires understanding hundreds of thousands of constantly changing variables including URLs, parameters, form fields and cookies.

A WAF protects against many application attacks, including:

  • Web, HTTPS (SSL), XML vulnerabilities
  • SQL Injection
  • Session Hijacking
  • Cross Site Scripting (XSS)
  • Buffer Overflow
  • Cookie Poisoning
  • Brute Force Login Attempts
  • Denial of Service
  • Directory Traversal
  • Web Server and OS attacks

Netlink Group can recommend the most suitable deployment methods for any type of network.

 

 

Preload