No serious business can tolerate an
unsecured IT environment that is
susceptible to intrusion, hackers and
unsolicited content and spam attacks.
Complying with international security
standards, Automated’s certified
security professionals have conducted
comprehensive assessment of risk
analysis and recommended efficient
security measures for various
industries. By prioritizing your
business objectives, we design
cost-effective security measures to help
safeguard your critical network
resources against network integrity and
information threats.
Firewall Solution
A firewall is the most commonly deployed
security gateway among enterprises. It
acts as the first line of defense to
secure network security. It helps to
track and control communications,
deciding whether to allow, reject or
encrypt communications. Firewalls have
been increasingly used to protect
sensitive portions of LANs and
individual personal computers.
VPN Solution
A virtual private network (VPN) provides
the most cost-effective way to
inter-connect branch offices by public
network. The VPN is used widely by
enterprises to create a secured and
transparent access infrastructure that
spans across large geographic areas,
providing site-to-site connections to
branch offices and allowing mobile users
to dial up to company LANs.
Antivirus Solution
An antivirus solution protects computing
programs and data from the single
greatest threat to the network — the
computer virus.
IDS Solution
By monitoring network traffic
proactively, watching for suspicious
activity and notifying customers of an
attack on a network or computer system,
an intrusion detection system (IDS)
solution enhances firewall protection.
There are two types of IDS: Network IDS
(NIDS) and Host IDS (HIDS). NIDS is
designed to support multiple hosts,
whereas HIDS is set up to detect illegal
actions within the host. Most IDS
programs use signatures of known cracker
attempts to signal and alert.
Single Sign-on Solution
Single sign-on allows users to log on
once to a network and be able to access
all authorized resources within the
enterprise. It accepts the user’s name
and password and logs on automatically
to all appropriate servers.
Two-Factor Authentication Solution
Two-factor authentication provides a
more reliable level of user
authentication than a reusable password.
It can identify who is accessing
sensitive networked information assets.
Two-factor authentication requires users
to identify themselves with two unique
factors — password/PIN and
Token/Smartcard — before access can be
granted.