Network Security — High Security, Less Risk

All-round protection for your network. Especially when it comes to IT, small and middle-sized enterprises (SMEs) often don’t have the resources large-scale companies have at their disposal. In network security, however, shortcuts are not an option. That is why we offer you the highest possible, but affordable, security — with competitively priced, state-of-the-art firewalls and cost-effective secure network solutions.

Our Network Security Services

  • Network Virtualisation — logical isolation of network segments with different security requirements and controlled traffic flows between them

  • Firewalls — state-of-the-art firewall solutions, including their long-term management and constant monitoring

  • Network Authentication and Encryption — state-of-the-art network authentication and encryption solutions, e.g. with site-to-site secure Internet Virtual Private Networks (VPNs)

  • Remote Access — secure remote access solutions for “road-warriors” or home workers

  • Intrusion Prevention Systems (IPS) — detecting, blocking and reporting unauthorised access attempts

  • Anti-Virus Protection — up-to-date anti-virus protection solutions at the network level

  • Network Security Analysis — analysis of network structure and design, of software versions, documentation, security processes and procedures

  • ISO 27000 — security audits of the entire network according to ISO 27000

Focusing on Firewall Configuration and Firewall Management

One of the key aspects to ensure network security is the configuration and management of firewalls. We believe in ensuring the highest possible security whilst minimising the intrusiveness of security measures on day-to-day operations. All unnecessary network activity is blocked. It is our goal to provide the user with the highest possible security without obstructing work processes. This is why a consistent security design and practice aligned with company processes is so important to us.

Designing for Security and Keeping it Up-to-Date

With network security, it is important to build multiple walls of protection so that breaking through one doesn’t automatically expose all the company’s valuable assets. To have the optimum benefit,security must be built-in by design in the very structure and organisation of the network. Furthermore, to uphold a high standard, security enforcement systems must be kept up-to-date with the latest software releases and actively monitored to ensure security breaches are immediately recognised and repelled. Regular reviews ensure that these security standards are being maintained.

Today’s Challenges in Network Security

  1. Bring your own device (BYOD)

    Both welcomed and feared: the increasing proliferation of personal, employee-owned, mobile network devices, such as laptops, mobile phones, etc., in companies today represents an enormous potential for cost reduction, increased productivity and improved staff motivation. On the other hand, it presents a potential security risk.

    We can help: We can support you at all levels to define your approach to BYOD, particularly in the context of network services and mechanisms. For example, we offer solutions for remote access that enforce an acceptable security standard on the mobile devices even in remote, foreign network environments, when accessing the corporate network.

  2. IPv6

    Old and new security risks: IPv6 has many advantages — automatic configuration, for example, reduces IT management costs. However, many of the security issues with IPv4 also exist with IPv6 (e.g., man-in-the-middle attacks, sniffing, rogue devices). There are also additional threats unique to IPv6. Nevertheless, due to the exhaustion of the IPv4 address space, deploying IPv6, preferably sooner rather than later, is unescapable.

    Crystal supports the migration to IPv6: Now is the time to deploy IPv6. Crystal is a Local Internet Registry and a member of the RIPE Network Coordination Centre. As such, we can obtain and manage public IP addresses and related resources (AS numbers, IP address space, etc.). Our experience with IPv6 dates back to some of the very first deployments in the 1990s.

  3. Cloud Computing

    A new challenge for network security: The trend to cloud computing solutions, whether public, private or hybrid, presents a new challenge in terms of data security. Critical business data is stored in undefined, remote locations, perhaps even in different countries, and needs to be accessed across not only the company’s own network,  but also that of many Internet Service Providers or Carrier-based WAN network infrastructures.

    More security in the cloud with Crystal: Not only the security of the data itself, but also network security is a critical consideration. Communication across the network used by your company to access and process the remotely stored data in the cloud needs to be secured to prevent malicious use and interception.