[vc_row][vc_column width=”1/2″][vc_custom_heading text=”Managed Firewalls” font_container=”tag:h2|font_size:24|text_align:left” google_fonts=”font_family:Montserrat%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal”][/vc_column][vc_column width=”1/2″][vc_custom_heading text=”Managed Firewall Services” font_container=”tag:h2|font_size:24|text_align:left” google_fonts=”font_family:Montserrat%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal”][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][vc_column_text css_animation=”left-to-right”]New York Technology Company has vast experience with many firewalls including Checkpoint offerings, Cisco Pix, ASA, Juniper Netscreen, Nortel Contivity, Stonesoft Stonegate, Raptor, Sidewinder and others.

Corporations rely heavily on highly available, secure computing environments to effectively and safely conduct business. Firewalls are one of the key components of a secure network as they protect critical information assets.

Firewalls are configured to allow wanted traffic in and to keep unwanted traffic out. However, firewalls need to be continously updated to support the changing needs of a business. Tasks such as adding new VPN users, protecting against new attacks, allowing application access to and from distinct locations. A firewall when managed properly can protect your security posture to a great degree.

Firewall management can become resource intensive and requires a high skill level. Because of the complexity involved, a majority of firewall breaches are caused by mis-configuration of firewall rules and policies.

A compromise can cost you millions of dollars in losses, investor confidence and penalties if under regulation. E-Fensive can review your existing policies and offer exact solutions to fit your need. We offer a firewall review product as well as a managed firewall service.[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css_animation=”right-to-left”]Did you know, the average cost of an experience firewall engineer can exceed $80,000.00 (US). Choosing a managed firewall service provider can save you money in the long run. Aside from the savings, experts who already manage hundreds of firewalls have experienced many attack vectors and are aware of the ever changing threats. Let us assist you in safeguarding your infrastructure.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/1″][vc_custom_heading text=”Supported Platforms / Technologies / Methodologies” font_container=”tag:h2|font_size:18|text_align:left” google_fonts=”font_family:Montserrat%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal”][/vc_column][/vc_row][vc_row][vc_column width=”1/1″][vc_images_carousel images=”6365,6366,6367,6368,6369,6370,6371,6372,6373,6374,6375,6376,6377,6378,6379,6380″ onclick=”link_no” custom_links_target=”_self” mode=”horizontal” speed=”2000″ slides_per_view=”6″ autoplay=”yes” hide_pagination_control=”yes” hide_prev_next_buttons=”yes” wrap=”yes” img_size=”full”][/vc_column][/vc_row][vc_row][vc_column width=”1/1″][vc_column_text css_animation=”top-to-bottom”]The list above is not all inclusive but merely a fraction of the devices we currently maintain and manage. We have extensive experience with other solutions so feel free to contact us regarding your existing infrastructure.[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1423545286482{padding-top: 50px !important;background-color: #eeeeee !important;}” inertia=”0.1″][vc_column width=”1/1″][vc_custom_heading text=”Security Auditing” font_container=”tag:h2|font_size:24|text_align:left” google_fonts=”font_family:Montserrat%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal”][/vc_column][/vc_row][vc_row css=”.vc_custom_1423545305269{margin-top: -50px !important;border-top-width: -50px !important;padding-top: -50px !important;padding-bottom: 50px !important;background-color: #eeeeee !important;}” inertia=”0.1″][vc_column width=”1/2″][vc_column_text css_animation=”left-to-right”]Concerned with compliance? You should be. Corporations face a multitude of regulatory issues, from SOX, HIPAA, GLBA, PCI DSS and the list continues to grow.

Meeting the vast requirements of compliance regulations is not as expensive as NOT meeting them. As of June 30th 2008, PCI DSS Section 6.6 is now required, which means that companies who deal with credit or debit cards online must use an application layer firewall or have a complete website assessment to remain PCI compliant.[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css_animation=”right-to-left”]“acquirers failing to provide confirmation that their level 1 and 2 merchants are not storing full track data, CVV2 or PIN data by March 31, 2007, will be eligible for fines up to $10,000 a month per merchant, subject to escalation in the event material progress toward compliance is not made in a timely manner,”

“Acquirers will be fined between $5,000 and $25,000 a month for each of its level 1 and 2 merchants who have not validated by Sept. 30, 2007, and Dec. 31, 2007, respectively.”[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/1″][vc_custom_heading text=”Sources:” font_container=”tag:h2|font_size:18|text_align:left” google_fonts=”font_family:Montserrat%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal”][/vc_column][/vc_row][vc_row css=”.vc_custom_1423545570637{margin-top: -50px !important;border-top-width: -50px !important;padding-top: -50px !important;}” inertia=”0.1″][vc_column width=”1/2″][vc_column_text css_animation=”left-to-right”]PCI Security Standards
PCI Answers[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css_animation=”right-to-left”]Our team can assist you with forward facing documentation for any auditing firm and guarantee compliance is met. We follow a structured methodology compromised of CoBIT, NIST, ITIL, ISO guidelines, recommendations and practices. We will assist your existing staff assess the current posture of your infrastructure and will make recommendations based on our findings.[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1423545333845{padding-top: 50px !important;background-color: #eeeeee !important;}” inertia=”0.1″][vc_column width=”1/3″][vc_custom_heading text=”Infrastructure Auditing” font_container=”tag:h2|font_size:18|text_align:left” google_fonts=”font_family:Montserrat%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal”][/vc_column][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row][vc_row css=”.vc_custom_1423545305269{margin-top: -50px !important;border-top-width: -50px !important;padding-top: -50px !important;padding-bottom: 50px !important;background-color: #eeeeee !important;}” inertia=”0.1″][vc_column width=”1/4″][vc_column_text css_animation=”top-to-bottom”]

  • Passwords
  • Access Control
  • Logging
  • Computers and laptops
  • Mail servers

[/vc_column_text][/vc_column][vc_column width=”1/4″][vc_column_text css_animation=”top-to-bottom”]

  • SAN and NAS equipment
  • Routers and networking equipment
  • Printers
  • Cameras, digital or analog, with company-sensitive photographs
  • Data-sales, customer information, employee information

[/vc_column_text][/vc_column][vc_column width=”1/4″][vc_column_text css_animation=”top-to-bottom”]

  • Company smartphones/PDAs
  • VoIP phones, IP PBXs, related servers
  • VoIP or regular phone call recordings and records
  • Email
  • Log of employees daily schedule and activities

[/vc_column_text][/vc_column][vc_column width=”1/4″][vc_column_text css_animation=”top-to-bottom”]

  • Web pages
  • Web servers
  • Security cameras
  • Employee access cards
  • Access points (i.e., any scanners that control room entry)
  • Wireless Access Points

[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1423545544517{margin-top: -50px !important;border-top-width: -50px !important;padding-top: -50px !important;padding-bottom: 50px !important;background-color: #eeeeee !important;}” inertia=”0.1″][vc_column width=”1/1″][vc_column_text css_animation=”appear”]This list can become extensive as an audit is essentially an assessment of how effective an organization’s security policy is being implemented, whether or not a policy even exists. It is after all possible to find a vast number of organizations nowadays where there are no security policies.[/vc_column_text][/vc_column][/vc_row]