rpbg-logo Breathing life into ICT
149 - ISP Support

Viewing: B2B | Switch to B2C

Data Security

Security starts with a scan and an assessment

Network and data security are essential for managing today's modern data center, but it is impossible to create your security plan without knowing your vulnerabilities. That is why RPBG offers Security Assessment services. Our team performs a vulnerability scan of a single Local Area Network and prepares an executive report with key recommendations that will increase your security and lower the risk to your organization.


Your IT security assessment consists of the following elements:

Consolidated security report

The Consolidated Security Report rates individual computers based on various security criteria. Devices discovered on the network are assigned an overall score and a specific score for each of the rating categories.  

Security risk report 

This executive-level report includes its own security risk score, summary charts, and an explanation of the risks identified in the security scans.

Security policy assessment report

A detailed overview of the security policies in effect on both domain-wide equipment as well as on local devices.

Share authorization reports

Comprehensive lists of all network shares per computer, indicating which users and groups have access to which devices and files, and what level of access they have. “Share Permission Per User Report” organizes permissions per user and lists all shared computers and files these users can access. 

Outgoing security report

Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information about the accessibility of Internet content.

Liability report for data breach

Personally identifiable customer information on computers exposes your business to liability. This report aims to demonstrate the vulnerability of your organization by identifying specific and detailed instances of personally identifiable information (PII) in your computer network that could be the target of hackers and malicious insiders, as well as calculating potential financial liability based on industry published research.

Security Management Plan

The Management Plan is a guide to move forward by ranking and prioritizing individual problems based on their potential risk to your network. If you solve problems with lower risk scores, the overall risk score is not lowered, but the overall problem score is lowered. To reduce global risk and improve network health, you must first address the issues with higher risk scores.



What is a Next-Generation Firewall?

The Next-Generation firewalls (NGFWs) filter network traffic to protect an organization against internal and external threats. In addition to maintaining stateful firewall functions such as packet filtering, IPsec and SSL VPN support, network monitoring, and IP mapping functions, NGFWs have deeper capabilities for inspecting packet contents. These capabilities provide the ability to identify attacks, malware, and other threats and enable the NGFW to block these threats. NGFWs provide organizations with SSL inspection, application management, intrusion prevention, and advanced visibility across the entire attack surface. NGFWs not only block malware but also include connectivity to a central platform that adapts to changes and can better protect against new threats. Next-Generation firewalls are an essential part of implementing network security.

As a Fortinet Partner, we are ready and able to work out the correct solution for you that meets your requirements and wishes.


BYOD Security

What does the acronym BYOD stand for?

BYOD stands for "bring your own device". These devices can be smartphones, tablets, personal computers, laptops, or USB drives. It gives employees more freedom to use their own devices to perform their daily tasks. This can prove to be very efficient for the organization. However, BYOD must be carefully managed with emphasis on maintaining security and productivity.

What are the pros and cons of a BYOD policy?
  • Faster Technology: With a BYOD policy, an organization benefits from the faster adoption of new technologies as well as devices that provide faster performance and more computing power. Keeping up with changing technology can be expensive and time-consuming for an IT manager, but when employees bring their own technology there is no need to constantly update the company's technology portfolio.
  • Less time to train employees: When an employee brings their own device, they usually already know how to use it. The transition from one operating system to another is often accompanied by a learning curve that takes time from the new employee. In this way, BYOD policies can increase productivity.
  • Lower upfront costs during onboarding: If an organization needs to purchase a new device, costs can quickly add up because they have to install new virus and malware protection software and train new employees on how to use the device. With BYOD, these costs can be a fraction of what they otherwise would be. With every new employee, an IT team must regularly provide new security protocols to secure interaction with the network. Employees often have more than adequate security on their own devices, and BYOD policies may require them to purchase a security solution before accessing the network.
  • Employer Saves More Money: Constantly buying new technology to ensure employees have effective devices can be a significant expense on a company's balance sheet. With a BYOD policy, much of the cost was already borne by the employee when the device was bought. In addition, if employees bring their own devices, they are responsible for upgrading as needed. Not only does this shift costs away from the business, but it also forces the employee to treat their device with more care. When employees take over the maintenance of their device, the company doesn't have to pay for it, saving critical overhead costs.

  • Increased complexity for security protocols: Because each device has its own vulnerabilities, including those it can introduce into the organization's network, you may need to create a more complex set-up of protocols to ensure that each device is secure and not a threat to the network.
  • Increased security risk: Each type of device and operating system requires its own security measures so that all endpoints are protected from threats. Device policies that allow employees to bring their own technology can expose the organization to more risks unless each is properly protected.
  • Device as a distraction: Most people have apps on their personal devices that can provide significant distraction. For example, messaging apps, games, and social media apps can easily grab an employee's attention when they need to focus on the task. The problem is compounded by the specialized app presets that already exist on an employee's device. 
  • Limited Privacy: With a BYOD policy, both employees and the organization can face privacy concerns. For an employee, their personal device, including all information, data, and passwords, is exposed to the company-wide network. For an organization, information, data, marketing materials, and even trade secrets must all pass through the personal devices of individual employees, which may not be as discreet as they should be. In addition, any device that introduces an employee to the network opens a potential door for malware that can be used to steal sensitive company files.

The RPBG has ready-made templates that are in line with a BYOD policy within organizations. If you would like to know more about this, please do not hesitate to contact us.

Endpoint Protection

Endpoints are often the target of attacks. A recent survey showed that 30% of endpoint intrusions had malware installed. The RPBG strengthens endpoint security through integrated visibility, control, and proactive defense through the Fortinet product called Forticlient. With the ability to detect risks, the risk of infection and attacks can be reduced. Forticlient proactively defends against advanced threats. The tight integration with a central management platform provides the ability to contain threats and control outbreaks.

Need More Information?