The enterprise network often provides employees with a connection to the Internet from the corporate headquarters campus. It is usually centralized in order to more easily protect a single interface to the public world. That’s exactly where perimeter control solution such as firewalls and intrusion-detection systems (IDSs) are generally deployed to prevent malicious intrusion of unauthorized persons. It is highly recommended that firewalls be implemented at every site within an enterprise to secure internal and external traffic, and at every point of interconnection with the Internet (e.g. even a remote PC). In some cases, it is appropriate to integrate this functionality with secure IP services gateways used also for remote office and remote access IP-VPNs.
Firewalls provide a perimeter defense against unauthorized access—an essential first step when planning for Internet access. Firewalls come in various sizes and capabilities, fitting many specific network requirements depending on their point of use. An emerging trend is to use new, multi-gigabit firewalls to interconnect segments of the campus LAN, which keeps departments separate and enables communication only through firewall security policies. An IDS monitors the network to identify unauthorized users or suspicious patterns of utilization. Most IDS applications compare network traffic and host log entries to match data signatures and host address profiles indicative of hackers. Intrusion-detection software identifies traffic patterns that indicate the presence of unauthorized users. Suspicious activities trigger administrator alarms and other configurable responses. BTC Networks partners with best-of-breed companies such as Internet Security Systems (ISS) to offer specialty solutions for intrusion-detection.
Content inspection via content filtering and anti-virus systems. These tools provide essential protections for remote and local computing, ASIC-based Network Anti-virus solution can be used to secure the network from different kinds of viruses and blended threats that are of major concern for network managers nowadays.
Load-balancing. Firewalls and VPNs are compute-intensive applications and can become bottlenecks to network performance. Load balancing using an application switch mitigates this problem by distributing traffic among multiple active devices, enabling many firewalls/VPNs to operate in parallel.
In order to offer the best security technologies available in the market today, BTC Networks has partnered with the following vendors:
Internet Security Systems (ISS)