The security of a network is as strong as its weakest link. For issues ranging from secure wireless access to multi-site VPN connectivity we are here to help.
Security services, firewalls, content filters, malware & spyware protection. Without these security measures in place you put yourself and your customers at risk. Let Metro Data come in and perform a security audit so that you can rest easy that your network is secure.
Many offices opt to expand their network over wireless 802.11a/b/g/n instead of running physical cable. Many wireless networks today have no security set up whatsoever. This makes it trivial to sit outside with a laptop and view all network communication including passwords and files. Worse yet, many wireless access points that do have security enabled are often misconfigured and can still be broken in to in a matter of seconds or minutes. If you need multiple access points to cover a large location, we can implement a system to give you wireless roaming across your enterprise. We know the common holes that hackers enter through and we know how to configure your wireless the right way the first time.
So often we are called out because "the internet is down" or "I can't access my files on the server". There are various causes to this and we know right where to look. Whether it's a packetstorm caused by plugging a looping back into itself or a rogue router installed by Bob down the hall, we can track it down and get you back up and running. Of course, sometimes the internet really is out or intermittent - we can talk to your internet provider on your behalf to get things straightened out. Maybe you really can't access your files - we can fix the permissions on the server so that you can.
Virtual Private Networks (VPN)
Many businesses have site-to-site VPNs to allow staff at multiple locations to securely connect across the insecure internet. We can help configure your network gateway to allow you to do this seamlessly on your PC, laptop, or phone. Do you have two or more locations? We can implement a solution to securely connect them all together without the cost of an expensive MPLS circuit.
Unified Threat Management (UTM)
The first step in any good network's line of defense is the firewall. This prevents a good number of attacks by limiting the number of entry points an attacker can come in from. Most consumer grade devices these days have this functionality built in out of the box. But what good is a firewall to block connections from the outside if your users on the inside still click on every enticing link they see? Consumer grade routers provide little to no amount of spam or content filtering to stop rogue web pages and emails from getting to the user. That's where we come in. By deploying a Unified Threat Management (UTM) device we can help you filter the bad stuff out before it ever gets to the users.
For more information, call 410-667-3600