{"id":4393,"date":"2018-08-09T10:36:29","date_gmt":"2018-08-09T09:36:29","guid":{"rendered":"http:\/\/webcic-pre.cic.es\/?page_id=4393"},"modified":"2021-11-04T10:54:49","modified_gmt":"2021-11-04T09:54:49","slug":"perimeter-security-solutions","status":"publish","type":"page","link":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/","title":{"rendered":"Perimeter Security Solutions"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>We manage your communications security, both internal and on the internet, for SMEs and large corporations.<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What are Perimeter Security Solutions?<\/strong><\/h3>\n\n\n\n<p>Perimeter security solutions allow <strong>your communications to be more efficient and faster<\/strong>.&nbsp; They will also be <strong>always available<\/strong>, safe from cyber security attacks, allowing your workers to be more productive.<\/p>\n\n\n\n<p>At CIC we carry out the whole project: <a href=\"https:\/\/www.cic.es\/en\/it-consulting\/\">consulting<\/a> and a specialised study of your enterprise, design, hardware and software supply, development, deployment, installation, maintenance, training and integration with other systems in different environments. All our IT solutions always comply with the premise of <strong>availability, reliability, easy access and security<\/strong>.<\/p>\n\n\n\n<p>We bring experience, the best professionals and all our projects are backed up by <strong>the most prestigious manufacturers<\/strong> in the sector in which we have formed alliances, partnerships and we are <strong>professionally certified<\/strong> by them (<em><a href=\"https:\/\/www.cisco.com\/c\/en_uk\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco<\/a>,&nbsp;<a href=\"https:\/\/www.checkpoint.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Checkpoint<\/a>,&nbsp;<a href=\"https:\/\/www.fortinet.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fortinet<\/a>,&nbsp;<a href=\"https:\/\/www.microsoft.com\/es-es\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a>,&nbsp;<a href=\"https:\/\/www8.hp.com\/uk\/en\/home.html\" target=\"_blank\" rel=\"noreferrer noopener\">HP<\/a>, F5,&nbsp;<a href=\"https:\/\/www.allot.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Allot<\/a>, Packeteer<\/em>\u2026)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Perimeter Security Environments:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Firewalls <\/strong>and UTM systems (Unified Threat Management): Cisco PIX\/ASA, Fortigate, Checkpoint, Juniper, ISA Server, Sonicwall, Linux iptables\u2026<\/li><li><strong>Intrusion Prevention System (IPS)<\/strong><\/li><li><strong>Anti-spam <\/strong>software and hardware for email security<\/li><li><strong>Bandwidth <\/strong>management: Allot, Packeteer<\/li><li><strong>Load Balancer (Delivery Controllers): <\/strong>F5, FortiBalancer<\/li><li><strong>Integration <\/strong>with your existing security infrastructure and directories, thanks to our qualified and certified personnel Microsoft Gold Partner and UNIX\/Linux<\/li><li><strong>AAA <\/strong>Services (Authentication, Authorization and Accounting), Access control (NAC), RADIUS\u2026etc.<\/li><li><strong>Cloud Services <\/strong>management for clean networks<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We manage your communications security, both internal and on the internet, for SMEs and large corporations. What are Perimeter Security Solutions? Perimeter security solutions allow your communications to be more efficient and faster.&nbsp; They will also be always available, safe from cyber security attacks, allowing your workers to be more&#8230;<\/p>\n","protected":false},"author":1,"featured_media":4066,"parent":4389,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-servicios.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4393","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Perimeter Security Solutions - CIC Consulting Inform\u00e1tico<\/title>\n<meta name=\"description\" content=\"Perimeter security solutions allow your communications to be more efficient and faster. We manage your communications security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Perimeter Security Solutions - CIC Consulting Inform\u00e1tico\" \/>\n<meta property=\"og:description\" content=\"Perimeter security solutions allow your communications to be more efficient and faster. We manage your communications security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"CIC Consulting Inform\u00e1tico\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CIC.Consulting\/\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-04T09:54:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/08\/DSC04383.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CICactualidad\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/it-security\\\/perimeter-security-solutions\\\/\",\"url\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/it-security\\\/perimeter-security-solutions\\\/\",\"name\":\"Perimeter Security Solutions - CIC Consulting Inform\u00e1tico\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/it-security\\\/perimeter-security-solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/it-security\\\/perimeter-security-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cic.es\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/DSC04383.png\",\"datePublished\":\"2018-08-09T09:36:29+00:00\",\"dateModified\":\"2021-11-04T09:54:49+00:00\",\"description\":\"Perimeter security solutions allow your communications to be more efficient and faster. We manage your communications security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/it-security\\\/perimeter-security-solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/it-security\\\/perimeter-security-solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/it-security\\\/perimeter-security-solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cic.es\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/DSC04383.png\",\"contentUrl\":\"https:\\\/\\\/www.cic.es\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/DSC04383.png\",\"width\":600,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/it-security\\\/perimeter-security-solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"CIC\",\"item\":\"https:\\\/\\\/www.cic.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security\",\"item\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/it-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Perimeter Security Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/#website\",\"url\":\"https:\\\/\\\/www.cic.es\\\/\",\"name\":\"CIC Consulting Inform\u00e1tico\",\"description\":\"Somos una consultor\u00eda de ingenier\u00eda de desarrollo y proyectos de inform\u00e1tica y comunicaciones\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/#organization\"},\"alternateName\":\"CIC Consulting Inform\u00e1tico\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cic.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/#organization\",\"name\":\"CIC Consulting Inform\u00e1tico\",\"alternateName\":\"CIC Consulting Inform\u00e1tico\",\"url\":\"https:\\\/\\\/www.cic.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cic.es\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/cic_color.png\",\"contentUrl\":\"https:\\\/\\\/www.cic.es\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/cic_color.png\",\"width\":300,\"height\":200,\"caption\":\"CIC Consulting Inform\u00e1tico\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CIC.Consulting\\\/\",\"https:\\\/\\\/x.com\\\/CICactualidad\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/2157627\\\/\",\"https:\\\/\\\/www.pinterest.es\\\/cicconsultinginformatico\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/webmastercic\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Perimeter Security Solutions - CIC Consulting Inform\u00e1tico","description":"Perimeter security solutions allow your communications to be more efficient and faster. We manage your communications security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Perimeter Security Solutions - CIC Consulting Inform\u00e1tico","og_description":"Perimeter security solutions allow your communications to be more efficient and faster. We manage your communications security.","og_url":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/","og_site_name":"CIC Consulting Inform\u00e1tico","article_publisher":"https:\/\/www.facebook.com\/CIC.Consulting\/","article_modified_time":"2021-11-04T09:54:49+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/08\/DSC04383.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CICactualidad","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/","url":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/","name":"Perimeter Security Solutions - CIC Consulting Inform\u00e1tico","isPartOf":{"@id":"https:\/\/www.cic.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/08\/DSC04383.png","datePublished":"2018-08-09T09:36:29+00:00","dateModified":"2021-11-04T09:54:49+00:00","description":"Perimeter security solutions allow your communications to be more efficient and faster. We manage your communications security.","breadcrumb":{"@id":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/#primaryimage","url":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/08\/DSC04383.png","contentUrl":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/08\/DSC04383.png","width":600,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/perimeter-security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"CIC","item":"https:\/\/www.cic.es\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.cic.es\/en\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"IT Security","item":"https:\/\/www.cic.es\/en\/cybersecurity\/it-security\/"},{"@type":"ListItem","position":4,"name":"Perimeter Security Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.cic.es\/#website","url":"https:\/\/www.cic.es\/","name":"CIC Consulting Inform\u00e1tico","description":"Somos una consultor\u00eda de ingenier\u00eda de desarrollo y proyectos de inform\u00e1tica y comunicaciones","publisher":{"@id":"https:\/\/www.cic.es\/#organization"},"alternateName":"CIC Consulting Inform\u00e1tico","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cic.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cic.es\/#organization","name":"CIC Consulting Inform\u00e1tico","alternateName":"CIC Consulting Inform\u00e1tico","url":"https:\/\/www.cic.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cic.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/04\/cic_color.png","contentUrl":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/04\/cic_color.png","width":300,"height":200,"caption":"CIC Consulting Inform\u00e1tico"},"image":{"@id":"https:\/\/www.cic.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CIC.Consulting\/","https:\/\/x.com\/CICactualidad","https:\/\/www.linkedin.com\/company\/2157627\/","https:\/\/www.pinterest.es\/cicconsultinginformatico\/","https:\/\/www.youtube.com\/user\/webmastercic"]}]}},"_links":{"self":[{"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/pages\/4393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/comments?post=4393"}],"version-history":[{"count":3,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/pages\/4393\/revisions"}],"predecessor-version":[{"id":10844,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/pages\/4393\/revisions\/10844"}],"up":[{"embeddable":true,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/pages\/4389"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/media\/4066"}],"wp:attachment":[{"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/media?parent=4393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}