Network security is a primary consideration in contemporary computing environments. In addition to securing individual servers, it is necessary to secure network perimeters. External points of access to internal networks must be carefully monitored and controlled to permit only expected and legitimate traffic.
complete configuration services are available for your choice of cisco pix firewalls, cisco routers and cisco switches. shipment of preconfigured units may be arranged for final placement by client personnel.
on-site and remote administration can be obtained on hourly or retainer basis. coverage includes hardware deployment, network design, operations automation and intrusion response.
qualifying clients with high volume public traffic may benefit from entering into peering arrangements. peering permits the direct injection of traffic into destination networks without payment for transit bandwidth. peering negotiations may be carried out for clients once it has been determined that there is an acceptable probability of concluding the desired peering agreements.