All-round protection for your network. Especially when it comes to IT, small and middle-sized enterprises (SMEs) often don’t have the resources large-scale companies have at their disposal. In network security, however, shortcuts are not an option. That is why we offer you the highest possible, but affordable, security — with competitively priced, state-of-the-art firewalls and cost-effective secure network solutions.
Network Virtualisation — logical isolation of network segments with different security requirements and controlled traffic flows between them
Firewalls — state-of-the-art firewall solutions, including their long-term management and constant monitoring
Network Authentication and Encryption — state-of-the-art network authentication and encryption solutions, e.g. with site-to-site secure Internet Virtual Private Networks (VPNs)
Remote Access — secure remote access solutions for “road-warriors” or home workers
Intrusion Prevention Systems (IPS) — detecting, blocking and reporting unauthorised access attempts
Anti-Virus Protection — up-to-date anti-virus protection solutions at the network level
Network Security Analysis — analysis of network structure and design, of software versions, documentation, security processes and procedures
ISO 27000 — security audits of the entire network according to ISO 27000
One of the key aspects to ensure network security is the configuration and management of firewalls. We believe in ensuring the highest possible security whilst minimising the intrusiveness of security measures on day-to-day operations. All unnecessary network activity is blocked. It is our goal to provide the user with the highest possible security without obstructing work processes. This is why a consistent security design and practice aligned with company processes is so important to us.
With network security, it is important to build multiple walls of protection so that breaking through one doesn’t automatically expose all the company’s valuable assets. To have the optimum benefit,security must be built-in by design in the very structure and organisation of the network. Furthermore, to uphold a high standard, security enforcement systems must be kept up-to-date with the latest software releases and actively monitored to ensure security breaches are immediately recognised and repelled. Regular reviews ensure that these security standards are being maintained.
Bring your own device (BYOD)
Both welcomed and feared: the increasing proliferation of personal, employee-owned, mobile network devices, such as laptops, mobile phones, etc., in companies today represents an enormous potential for cost reduction, increased productivity and improved staff motivation. On the other hand, it presents a potential security risk.
We can help: We can support you at all levels to define your approach to BYOD, particularly in the context of network services and mechanisms. For example, we offer solutions for remote access that enforce an acceptable security standard on the mobile devices even in remote, foreign network environments, when accessing the corporate network.
Old and new security risks: IPv6 has many advantages — automatic configuration, for example, reduces IT management costs. However, many of the security issues with IPv4 also exist with IPv6 (e.g., man-in-the-middle attacks, sniffing, rogue devices). There are also additional threats unique to IPv6. Nevertheless, due to the exhaustion of the IPv4 address space, deploying IPv6, preferably sooner rather than later, is unescapable.
Crystal supports the migration to IPv6: Now is the time to deploy IPv6. Crystal is a Local Internet Registry and a member of the RIPE Network Coordination Centre. As such, we can obtain and manage public IP addresses and related resources (AS numbers, IP address space, etc.). Our experience with IPv6 dates back to some of the very first deployments in the 1990s.
A new challenge for network security: The trend to cloud computing solutions, whether public, private or hybrid, presents a new challenge in terms of data security. Critical business data is stored in undefined, remote locations, perhaps even in different countries, and needs to be accessed across not only the company’s own network, but also that of many Internet Service Providers or Carrier-based WAN network infrastructures.
More security in the cloud with Crystal: Not only the security of the data itself, but also network security is a critical consideration. Communication across the network used by your company to access and process the remotely stored data in the cloud needs to be secured to prevent malicious use and interception.