We manage your communications security, both internal and on the internet, for SMEs and large corporations.
What are Perimeter Security Solutions?
Perimeter security solutions allow your communications to be more efficient and faster. They will also be always available, safe from cyber security attacks, allowing your workers to be more productive.
At CIC we carry out the whole project: consulting and a specialised study of your enterprise, design, hardware and software supply, development, deployment, installation, maintenance, training and integration with other systems in different environments. All our IT solutions always comply with the premise of availability, reliability, easy access and security.
We bring experience, the best professionals and all our projects are backed up by the most prestigious manufacturers in the sector in which we have formed alliances, partnerships and we are professionally certified by them (Cisco, Checkpoint, Fortinet, Microsoft, HP, F5, Allot, Packeteer…)
Perimeter Security Environments:
- Firewalls and UTM systems (Unified Threat Management): Cisco PIX/ASA, Fortigate, Checkpoint, Juniper, ISA Server, Sonicwall, Linux iptables…
- Intrusion Prevention System (IPS)
- Anti-spam software and hardware for email security
- Bandwidth management: Allot, Packeteer
- Load Balancer (Delivery Controllers): F5, FortiBalancer
- Integration with your existing security infrastructure and directories, thanks to our qualified and certified personnel Microsoft Gold Partner and UNIX/Linux
- AAA Services (Authentication, Authorization and Accounting), Access control (NAC), RADIUS…etc.
- Cloud Services management for clean networks