IT Security - Open Reality

+44 (0) 1235 556400   |  sales@openreality.co.uk


IT Security

Security Solutions

In 2014, 81% of large organisations and 60% of small businesses suffered a security breach

Although the number of breaches experienced by UK organisations has fallen slightly in recent years, the severity and impact of attacks has increased, with the average cost of an organisations’ worst breach rising significantly. For small organisations the worst breaches cost between £65,000 and £115,000 on average and for large organisations between £600,000 and £1.15 million.

Increasingly mobile workforces and the reliance on web based applications means that IT security threats come from many sources and keeping up with them can be difficult. Effective security is all about protecting the network from intrusion, preventing access from unauthorised devices and allowing secure authentication. If an intrusion does occur you also need to identify it quickly so the breach can be closed and damage kept to a minimum.

Before you can establish what level of security is required for your business you need to review the personal data you hold and assess the risks to that data. Each organisation needs to address its own unique threat landscape. We work with you to implement the most appropriate, cost-effective security without compromising on protection.

Take the next step

Find out how to implement the most appropriate, cost-effective security without compromising on protection.

A Managed Security Service

A managed security service from BrightCloud removes the burden of training, change control and administration from your IT department and moves it to a focused specialist organisation. This saves you time and gives you next-generation security at an affordable monthly cost.

Our flexible packages mean that you can opt for a service that includes all the equipment and licenses needed to deliver a complete solution, or just the management of your own technology.

The Components of Successful Security

Firewall

The dynamic nature of modern day threats mean that simply blocking network ports is no longer an option. Responsible organisations know what applications are on their network and understand the risks that they create. As attacks can come from both outside and within the network, perimeter defence on its own is not enough, visibility and the ability to control application traffic is essential.

The implications of failing to establish visibility are massive should an attack be successful. The longer an attack is undetected the more damage it will cause, and not just to your own network, but potentially your customer’s too.

Palo Alto Next-Generation Firewalls

Palo Alto next-generation firewalls are all based on a consistent Single Pass Architecture, which enables full, contextual classification of traffic, followed by a rich set of enforcement and threat prevention options. The unique architecture classifies and controls traffic in a “single pass” through the firewall using a variety of stream-based technology components, allowing you to achieve superior security posture and efficiency.

Cisco ASA 5500 Series Next-Generation Firewalls

Cisco ASA 5500 Series Firewalls help you to balance security effectiveness with productivity. This solution offers the combination of the industry’s most deployed stateful firewall with a comprehensive range of next-generation network security services.

Citrix Netscaler

Citrix NetScaler is an application delivery controller (ADC) that improves the performance, security and resiliency of applications delivered over the web. Serving as the natural entry point or gateway to the network it authenticates each user attempting to access an application. It also protects against DDoS attacks and when placed in “learning” mode will analyse traffic to determine usage patterns that signify normal behaviour and block anything outside of this.

Web Security

In recent years the delivery of applications over the web has introduced new threats and vulnerabilities that traditional LAN-bound applications never had to contend with. Wi-Fi and 4G have become standard in offices, which means the traditional network perimeter has essentially dissolved and encrypted traffic is also on the rise. These seismic shifts are driving many companies to rethink their web security and seek comprehensive protection and control over all web traffic, even if it’s encrypted, regardless of location and device.

Blue Coat ProxySG

Industry-leading ProxySG appliances and virtual appliances provide a solution for complete control over all your web traffic, delivering world-class advanced web security and threat protection. Robust features include user authentication, web filtering, data loss prevention, inspection, and visibility of SSL-encrypted traffic (including the ability to stream decrypted content to an external server with an Encrypted Tap license), content caching, bandwidth management, stream-splitting and more.

Citrix Netscaler

Citrix NetScaler is an application delivery controller (ADC) that improves the performance, security and resiliency of applications delivered over the web. Serving as the natural entry point or gateway to the network it authenticates each user attempting to access an application. It also protects against DDoS attacks and when placed in “learning” mode will analyse traffic to determine usage patterns that signify normal behaviour and block anything outside of this.

Email Security

An estimated 91% of hacking attacks begin with a phishing or spear-phishing email and although firewalls and other products on the perimeter of your network may help prevent some malicious traffic, email is generally considered legitimate and is therefore allowed into the network.

Protecting against routine spam, viruses and malware is important, but you also need help responding to new threats and challenges that your current security infrastructure just wasn’t designed for. However if you are not careful it is very easy to overspend on email protection.

Mimecast

Mimecast is a cloud-based service which is always-on and always up-to-date, without the complexity and cost of traditional offerings. Added benefits of email cloud services provided by Mimecast include flexible and granular email security controls.

Mobile Device Management

Mobile device management is essential the moment a smartphone, tablet or laptop holding your data (or access to data) leaves the building. If you have lots of remote users the risk of a device falling into the wrong hands increases, and with the propensity towards flexible working and bring your own device (BYOD), mobile device management will become impossible if you have no way to gain and maintain control.

Citrix XenMobile

XenMobile delivers mobile device management (MDM), mobile application management (MAM) and enterprise-grade productivity apps in one comprehensive solution. XenMobile enhances the user experience on BYOD or corporate devices without compromising security.

Citrix ShareFile

ShareFile is a secure enterprise file sync and sharing service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.

Encrypted Traffic Management

Encryption protects data from being viewed in transit over the internet, but it also creates a significant blind spot for advanced malware while introducing privacy and regulatory compliance risks. You need to manage this dilemma by establishing a comprehensive encrypted traffic management strategy that addresses acceptable-use policies for inbound and outbound encrypted traffic, in an extensible architecture that will scale and protect the business, while also adhering to privacy and compliance requirements.

Blue Coat SSL Visibility Appliance

The Blue Coat SSL Visibility Appliance is the only dedicated enterprise-class encrypted traffic management technology in the industry. This unique solution offers complete visibility and control of encrypted traffic without requiring the re-architecture of network infrastructure. It lets you add policy-based SSL inspection and management capabilities to your network security architecture and lift the security blindfold created by encrypted traffic.

TESTIMONIAL

What really strikes me every time I come to Open Reality is the excitement and motivation of the staff. They have a passion for the products they sell…
Jussi KiviniemiVice PresidentEkahau

CASE STUDIES

ASK4: ECSE Testimonial

ASK4: ECSE Testimonial

We asked a graduate of the Ekahau Certified Survey Engineer (ECSE) training course what he wanted to get out of the course, what he learnt and how it will help in the real world, and who would benefit most from attending.

WHITE PAPERS

+44 (0) 1235 556400 | sales@openreality.co.uk