SECURE

Protecting and securing your business data and network

Data is the most valuable commodity in the world – and under threat every day.
1CONNECT can help you secure and protect your network infrastructure and data with leading edge security solutions to suit every budget.

SECURE

The Threat to Your Business

Secure cisco select partner

The business of today faces numerous threats to its cyber security which can compromise data and day to day operations.

In recent years we have seen many organisations become victims of ransomware attacks, massive data breaches, and supply chain threats with attackers being able to achieve many of their aims by using techniques that are not particularly advanced, blurring the distinction between nation states and criminals.

The 2017 Wannacry ransomware attack for example spread rapidly and affected 300,000 devices spanning 150 countries and affected services worldwide, including the NHS.  The attack demonstrated the real-world harm that can result from cyber attacks, particularly when they are designed to self-replicate and spread.

Cyber Essentials

Cyber Essentials is a UK government information assurance scheme operated by the National Cyber Security Centre (NCSC) that encourages organisations to adopt good practice in information security.

It includes an assurance framework and a simple set of security controls to protect information from threats coming from the internet.

Organisations can earn two levels of certification, or badges:

• Cyber Essentials: Organisations self-assess their systems, and this assessment is independently verified.
• Cyber Essentials Plus: Systems are independently tested, and Cyber Essentials is integrated into the organisation’s information risk management.
 

Annual recertification is recommended. Certifying Bodies are, in turn, licensed by Accreditation Bodies which have been appointed by UK government.

1CONNECT can help you find the right security solution whatever the size of your business and the requirements to protect it.

Cyber Essentials official logo

Cyber Essentials

As accredited partners for the world’s leading manufacturers of Firewall and security products, 1CONNECT can help you maintain the integrity of your valuable client information.

How to protect your network

The Internet can be a hostile environment. The threat of attack is ever present as new vulnerabilities are released and commodity tools are produced to exploit them. Doing nothing is no longer an option. Protect your organisation and your reputation by establishing some basic cyber defences to ensure that your name is not added to the growing list of victims

Reducing your exposure to cyber attack
Fortunately, there are effective and affordable ways to reduce your organisation’s exposure to the more common types of cyber attack on systems that are exposed to the Internet. The following controls are contained in the Cyber Essentials, together with more information about how to implement them:

  • boundary firewalls and internet gateways – establish network perimeter defences, particularly web proxy, web filtering, content checking, and firewall policies to detect and block executable downloads, block access to known malicious domains and prevent users’ computers from communicating directly with the Interne
  • malware protection – establish and maintain malware defences to detect and respond to known attack code
  • patch management – patch known vulnerabilities with the latest version of the software, to prevent attacks which exploit software bugs
  • whitelisting and execution control – prevent unknown software from being able to run or install itself, including AutoRun on USB and CD drives
  • secure configuration – restrict the functionality of every device, operating system and application to the minimum needed for business to function
  • password policy – ensure that an appropriate password policy is in place and followed
  • user access control – include limiting normal users’ execution permissions and enforcing the principle of least privilege
 

As accredited partners for the world’s leading manufacturers of Firewall and security products, 1CONNECT can help you maintain the integrity of your valuable client information.

1CONNECT can help you find the right security solution whatever the size of your business and the requirements to protect it.

Cisco Security

Prevent breaches automatically to keep the business moving
Are you protected 24/7? Cisco Talos constantly analyses threat data and creates security protections that the Cisco Next-Generation Firewall uses to automatically prevent breaches. We stop attacks in their tracks so your business won’t miss a beat.

Visibility to detect and stop threats fast
Are you seeing the full picture? You can’t stop threats that you can’t see. Get the deepest network and security visibility using built-in advanced security features like NGIPS and advanced malware protection to detect and stop the most advanced threats fast.

Automate operations to save time and reduce complexity
Stop playing whack-a-mole with threats. Let the Cisco Next-Generation Firewall do the work for you. Automated policy application and enforcement free up time so you can focus on high-priority tasks. Cisco firewalls work with the rest of Cisco’s integrated security tools to see and stop threats faster.

The security of your network is vital to the running of your business. 

Cisco Select Partner

1CONNECT is an accredited Cisco Select partner with access to resource and products from one of the world’s leading security vendors.

Cisco NGFW (Next Generation FireWall)

Defending networks against increasingly sophisticated threats requires industry-leading intelligence and consistent protections everywhere.  Improve your security posture today with Cisco NGFW.

Cisco NGFW sets the foundation for integrating powerful threat prevention capabilities into your existing network infrastructure, making the network a logical extension of your firewall solution.

Below we highlight five key benefits of having a secure Cisco NGFW as part of your network security.

Prevent attacks and quickly detect malware if it gets inside

Job number 1 of a firewall should be to prevent breaches and keep your organization safe. But since preventive measures will never be 100% effective, your firewall should also have advanced capabilities to quickly detect advanced malware if it evades your front-line defenses. Invest in a firewall with the following capabilities:

• Prevention to stop attacks before they get inside
• A best-of-breed Next-Generation IPS built-in to spot stealthy threats and stop them fast
• URL filtering to enforce policies on hundreds of millions of URLs
• Built-in sandboxing and advanced malware protection that continuously analyzes file behavior to quickly detect and eliminate threats
• A world-class threat intelligence organization that provides the firewall with the latest intelligence to stop emerging threats

See more so you can stop more

You can’t protect against what you can’t see. You need to monitor what’s happening on your network at all times so you can spot bad behavior and stop it fast. Your firewall should provide a holistic view of activity and full contextual awareness to see:

• Threat activity across users, hosts, networks, and devices
• Where and when a threat originated, where else it has been across your extended network, and what it’s doing now
• Active applications and websites
• Communications between virtual machines, file transfers, and more

Customization to meet the unique needs of every organisation

Whether you are a small to medium-sized business, or a large enterprise, you firewall should meet your unique requirements.
• Management for every use case – choose from an on-box manager or centralized management across all appliances
• Deploy on-premises or in the cloud via a virtual firewall
• Customize with features that meet your needs – simply turn on subscriptions to get advanced capabilities
• Choose from a wide range of throughput speeds

Accelerate malware detection to mitigate risk

The current industry standard time to detect a threat is between 100 to 200 days; that’s far too long. A next-generation firewall should be able to:
• Detect threats in seconds
• Detect the presence of a successful breach within hours or minutes
• Prioritize alerts so you can take swift and precise action to eliminate threats
• Make your life easier by deploying consistent policy that’s easy to maintain, with automatic enforcement across all the different facets of your organization

An integrated security architecture enables automation and reduces complexity

Your next-generation firewall should not be a siloed tool. It should communicate and work together with the rest of your security architecture. Choose a firewall that:

• Seamlessly integrates with other tools from the same vendor
• Automatically shares threat information, event data, policy, and contextual information with email, web, endpoint, and network security tools
• Automates security tasks like impact assessment, policy tuning, and user identification

Juniper Security

Best-of-breed security doesn’t always reduce the risk of a breach. The move to multicloud and distributed environments creates operational complexity that leads to gaps in your defense. It’s time for a better approach to security that effectively safeguards your organization while streamlining operations.  Juniper’s seamless security architecture delivers automated enforcement, increased visibility, and cloud protection to do just that.

Virtual
For private cloud, hybrid cloud or public cloud environments, Juniper virtual firewalls provide uncompromised flexibility, effectiveness and performance.

Small Enterprise and Branch office
Whether rolling out new services and applications across locations, connecting to the cloud or trying to achieve operational efficiency, Juniper branch firewalls help organisations realize their business objectives

Mid-size Enterprise and data centre
Compact, high-performance, next generation firewalls with hardware accelerated security services protect mission-critical people, data and infrastructure

Large data centre and Service providers
Highly effective protection, market leading performance, reliability and availability ideally suited to service provider, large enterprise and public sector organisations.

Juniper’s range of security products help protect users, applications, and infrastructure from cyberthreats across your network.

As an accredited Juniper partner, 1CONNECT can help you in selecting the right product to provide the maximum level of protection for your network infrastructure.

Case Studies

A collection of real world use of the technologies we offer in many varied scenarios.

We identify in each case the individual concerns, provide the appropriate solution and highlight the benefits of the completed project.

Need more information?

1connect main logo