Highly Secured

 

Our security strategy is built on two main pillars. The security of our community members infra structure and the security of the data they transport across our network veins.

For that our three Network Operations Centres NOCs work hand in hand with our partners and service providers to lock out threats and they day and night.

Our Host Security Service (HSS) provides best-of-class overall protection of our host. It provides login, system, and application protection capabilities from intrusions.

 Unified Threat Management

With threats rapidly increasing in volume and sophistication we leave

nothing for chance. We deploy enterprise grade UTM layer not only across our core network but we also make it available for our community members.

While most UTM products stop short at the web security level our UTM layer is truly comprehensive and extends across legacy Firewalls & NGFW, VPN, Intrusion Prevention Services ‘IPS’, Web Filtering, Anti Malware, Data Leakage Protection, Advanced Threat Protection, SD WAN, Switch Management and WLAN Controllers.

Unmatched Firewalls Fabric

Any device connected to our network is deemed a network device and for that reason we don’t only fortify the network cores. We complement traditional physical appliance form factors with carrier grade virtualized blanket of the state of the art next generation virtual firewall ‘NGVFW’ technology from global security leaders and extend it throughout our fabric to gain visibility and maintain consistent security policy as workloads, users, and data migrate to more agile, elastic, and virtualized infrastructure.

Our fabric delivers advanced security and control of traffic with other private, public, and hybrid clouds and enable higher throughput and lower latency for network VPN services such as NAT and DHCP.

Conditional Access & Authentication Management

We gate-keep the network through secure network management Simple deployment and licensing authentication tools that offer our community Intuitive, centralized authentication and authorization, Single-sign-on (SSO) for both web/cloud and network resources. Two-factor strong authentication and

Our Vulnerability Scan Service (VSS) continuously examines servers and websites with real-time update of 10,000+ types of vulnerability information in the rule library; scans urgent vulnerabilities, ports, and weak passwords to detect vulnerabilities and potential security risks to prevent asset loss and data leaks caused from attacks, ensuring data is more secure than ever before. prevent website interruption due to scanning traffic surges; prevents dirty data from being written into databases.

We leverage and Support our community IT departments & professionals’ tools for quick scan through multi-engine collaboration, leverages fingerprint identification, and accurately adopts scan rules, meaning higher scan efficiency.

Isolated & Vaulted Database

Broadcast Archive are treasures of human memories worthy of museum grade care and protection and there are no protection methods deemed enough to guard and protect such assets.

Data protection skills and infra structure are core deliverables for us. We work tirelessly with our community members and third party providers on best practices of broadcast data storage/archive vaulting using a mix of storage protocols including the industry S3 protocol developed by Amazon.

Our community content curators need no IT security skills to carryout routine cumulative incremental backup operations because we deploy sophisticated sets of encryption which identify and maintain versions of data objects for the last Level 0 incremental backup.

Curators class their own vaulting, isolation and retrieval policies and able to monitor the off-site installations metrics including the quality of air, auxiliary power back up, CCTV and security armed guards within isolation complexes.

  1. get started
  2. request demo
  3. Request Pricing