IT Security Solutions

According to a recent research survey, cyber attacks have increased by almost 80 percent over the last two years! Information Technology (IT) Security should be an ongoing and fundamental consideration in every aspect of your network infrastructure. Proper network configurations can go unnoticed to the untrained eye, which can result in multiple unknown "security vulnerabilities" or breaches in security. Professional security implementation requires a rigorous in-depth analysis with an overall solutions oriented strategy.

FCSI believes that affordable and effective network security solutions are possible to achieve through a highly skilled technology team. Initially, a specialized network security consultant will sit down with you to analyze your situation and create an outline for a strategic security solution. Our network security consultant will then present options and recommendations based upon your needs. Ultimately, our goal is to deliver to you the best value-based and cost-effective Network Security Consulting solutions possible.

Typical security services include:

Server Security Audit

A Security Audit offers your organization the opportunity to examine your systems for compliance to a variety of security standards. These standards can include internal and external security policies, software manufacturers' recommendations, legal requirements and known "best practices". Our Security Specialist will identify areas where your systems are out of compliance, and provide you with a written estimate of investment necessary to achieve conformance.

Security Auditing will identify the following potential problems:

Threat Assessment

A network must be designed with the goal of reducing or eliminating the risk of a security breach. A Security Threat Assessment will allow you to understand where your organization may be vulnerable to a security breach. Using specialized vulnerability management software tools and a series of interviews, our security consultants can help you identify critical areas of vulnerability. These assessments will be performed both internally and externally.

Threat Assessment Process:

Secure Design

The topology structure of your network is the backbone. While many networks are "flat" without subnetworks and multiple routers, a skilled specialist can diagram a new network structure that can greatly enhance your security level. For example, an office can be on a separate firewall than the warehouse, and a wireless network, exchange server or web server should be on a separate network with separate routing or DHCP. Comprehensive network design and access strategies include firewalls, intrusion detection systems and VPN networks.

Firewall Implementation

A reliable firewall is a critical aspect of any security initiative. We maintain partnerships with the industry's premier firewall manufacturers, including SonicWall, Check Point, and Cisco. Our consultants will assist you in selecting and implementing the firewall that makes the most sense for your organization. Basically, a firewall examines each network packet to determine whether or not to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users.

There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. The most effective firewall implementation is Stateful Packet Inspection. For mobile users, firewalls allow remote access into the private network by the use of secure logon procedures and authentication certificates (VPN).

Network Monitoring

Keeping up with hackers is a full-time job, and one that most organizations do not have the time to do. We proactively monitor hacker activity as they attempt to penetrate your network boundary and receive notifications of a security breach. You'll receive real-time intrusion detection monitoring, as well as log file analysis and comprehensive Internet usage and traffic reports.

Our security management software proactively ensures system availability by establishing security configuration baselines, continuously auditing for security vulnerabilities and helping to correct exposures before they result in security breaches or costly downtime.

Our group of monitoring programs will:

FCSI's team of professionals can provide your company the extra edge with streamlined processes, dependable delivery and subject matter experts to meet your services needs including: solution architecture, business analysis, project management and more. Engagements can be limited to project discovery and scope, or expanded as requested, up to full implementation with documentation and training.

Contact FCSI today for more information about how FCSI can support and implement your IT challenges while increasing efficiency and decreasing costs.

FCSI IT Security experts will work with you to customize a solution which best meet your needs and preferences.


VirtualizationVIRTUALIZATION: Transform by virtualizing data center infrastructure, decouple applications and data from the physical resources they run on. more»
Business SolutionsFCSI Business Solutions: Build manageable systems and automate operations in order to reduce costs, improve system availability and enhance service delivery. more»
Data StorageENTERPRISE STORAGE: Reduced costs and complexity, increase productivity and provide access to the right data. more»