Outsourced IT Support Services

From the blog

End-to-End Network Security

logo-security2

Network Security | Encryption

An existing customer required us to implement a secure and fully encrypted network.  Relying on File Permissions, Users Rights and Virtual Provisioning has become inadequate for this particular customers needs.  And so over time we have re-built their corporate network to incorporate a complete end-to-end security solution with a focus on encryption.

Various devices support encryption protocols (Switches, Routers, Servers etc..) but in order to properly control key management with those devices we configured an Enterprise Key Management System.

The encryption protocols are therefore centralised and available throughout the network, whether disk based or network traffic, all systems have been encrypted.

Encryption and segmentation of data at the network level is now an expected security element of the overall security strategy.