networksecurity_overview-place

Cybersecurity

The Gatekeeper Protecting Your Company’s IP

The name of the cybercriminal's game is profit.

Ever-increasing data breaches, ransomware proliferation . . . more and more, businesses are attacked in pursuit of money.  Whether that's holding data for ransom or selling off your customers' private information, cybercriminals will use any exploit they can to cash in.

Unfortunately, your own employees can be unwitting accomplices.  Experian's annual Data Breach Industry Forecast highlights employee negligence as a major factor in cyberattacks.

Manage your company’s security threats, both external AND internal, with PlanetMagpie Cybersecurity Consulting.  We balance Internet security best practices with your end users’ needs, and use the latest gear and security testing tools to keep your company safe.

2017 Annual Data Breach Industry Forecast—Experian

Companies spend more on their coffee than security
networksecurity-reviews

Cybersecurity Reviews

When we help a new customer with their cybersecurity, we start with a Cybersecurity Review.

Cybersecurity Reviews provide a detailed picture of where in your network hackers could break in, and where employees could sneak data out.  We test all of the “weak spots” we’ve come across in 20+ years of cybersecurity work—common security gaps, avenues for internal data theft, email dangers, malware breakpoints, accidental data loss prevention, etc.

Once we have the picture, we build a plan to lock down your network, without impacting employee productivity in the process.

PlanetMagpie has conducted network security reviews like these for Malwarebytes, Tessera, Headsets.com, Unitek, SCREEN-SPE, Davis Instruments, Linear Technology and many others.

Call us at 510-344-1200 to start your security review!

networksecurity-equipment

Cybersecurity Equipment: Juniper

Setting up a secure network requires several types of equipment—firewalls, routers, switches, VPN devices, and so on.  Bought & configured separately, these can take up a lot of rack space, time and expense.

Thanks to Juniper Networks’ innovation, what we recommend and install most often now are Juniper Service Gateways.  These are all-in-one devices, built to keep networks simple and safe.

PlanetMagpie uses and recommends the Juniper SRX series of service gateways.  Juniper has supplied high-performance networking products since 2001.  The SRX series' ease of configuration, reliability, and price point make it one of the top networking solutions available.

Juniper's Service Gateways combine routing, firewalls, site-to-site VPNs, and switching into one device.  Our Cybersecurity Engineers install & configure these service gateways, achieving that delicate balance between security and accessibility.

PlanetMagpie is a longtime Juniper partner with many years of experience working with their hardware (and many happy clients who are currently protected by it).

Already have security equipment in place?  Is it up-to-date?  Are you monitoring your network?  If not, you could have a security leak and not even know it.  PlanetMagpie can setup real-time monitoring for your network hardware and update each device's firmware as needed.

With proper configuration, your network equipment will:

  • Keep hackers out and malware from getting in
  • Stop malware brought in via BYOD from sending data out
  • Provide remote access to employees without multiple logins
  • Route traffic based on accessibility rules you set
  • Plug security holes that may arise between all of these elements!

Ready for a simpler, safer network? Request a Cybersecurity Equipment quote by using the Contact Us form on the right.

cybersecurity-extreme

Cybersecurity Equipment: Extreme Networks

Are your users reporting slow Internet connections?  Trouble getting on the wireless?  Your network may need more capacity:  faster switching functionality, perhaps additional wireless access points.

For high-performance network expansion, we recommend Extreme Networks.

Extreme switches fit well at the edge of the most demanding business networks.  They switch between Voice over IP (VoIP), wireless, video, and data traffic constantly.

Security?  Extreme switches are easy to set at maximum security.  We use them in our Cloud Datacenter and office as well as at customer sites, so we know the settings needed to maintain a secure perimeter.

Advantages to Using Extreme Switches

  • Scale up your network performance and wireless fast
  • Extreme hardware works natively with Juniper, Cisco, and many other network hardware brands
  • Grant users the access they need to work, securely, all day long

Time to expand your existing network?  Request an Extreme switches/wireless quote with the Contact Us form on the right.

Wireless Securtity

Wireless Security

Every wireless access point improves office Internet speeds, and thus productivity.  Every access point is also a potential backdoor for cyberattacks, or a way for employees & contractors to leak (or sneak) data out.

PlanetMagpie IT consultants set your Wi-Fi to the highest possible security standard by default.  When we’re done configuring, your Wi-Fi is as secure—if not more so—than the internal Ethernet connections.

You can secure your wireless networks in several ways.  These are the most common:

  1. Use Microsoft Active Directory, limiting users' wireless access at the account level (safer), or
  2. Use an SSID and password (common, but less safe)

We only recommend wireless access point hardware that can integrate with Microsoft’s Active Directory, which gives you a more robust security layer.

Which is why we use and recommend the Extreme line of WiNG access points.  These access points are enterprise-grade wireless.  Formerly made by Motorola, they have the best signal across office buildings we’ve come across.

Extreme WiNG access points allow more sessions per device, which means you need fewer access points in your network.  Fewer to secure, while everyone can still get on the Wi-Fi (safely).

Characteristics you'll find in every access point PlanetMagpie uses:

  • High-capacity antennas for a high-density environment, like business campuses
  • Enterprise-grade construction for supporting multiple high-bandwidth connections
  • 802.11ac speeds
  • Gigabit Ethernet connectivity
  • Guest Network/VLAN function (offering a “guest network” to visitors or patrons is convenient, and protects you from cyberattacks sneaking into your internal network)

Ready to secure your Wi-Fi (and the rest of your network)?  Call PlanetMagpie at 510-344-1180 and ask for the Cybersecurity Team.

malwarebytes-endpoint-security

Malwarebytes Endpoint Security

Malwarebytes Anti-Malware for Business is all of the industry-leading protection and remediation technologies you need, compacted into one powerful solution.  What does it do?  What doesn’t it do?

  • Proactive anti-malware scanning engine, stopping malware before you see it
  • Small system footprint
  • Malicious website blocking
  • Three scan modes
  • Includes anti-ransomware features
  • Compatible with legacy security solutions

The Corporate Edition of Malwarebytes also includes Malwarebytes Anti-Exploit.  This tool shields vulnerable apps (like your Web browser) from harmful code on the Web.

  • Gives your computer 4 different layers of protection across stages of an attack
  • Extremely light footprint (3MB of space), with no signature database
  • Compatible with all anti-malware and antivirus products
  • Customizable protection for third-party or custom app

On a Mac?  Despite what most people think, Macs are vulnerable to malware and ransomware.  That’s why Malwarebytes made a Mac Remediation Client too.

  • Separate remediation-only client for Mac
  • Works on all hardware running Mac OSX 10.8 or later
  • Protects the Mac against corrupted apps in the App Store

The people behind Malwarebytes spend all day, every day defending against malware & ransomware.  To see just how seriously they take their work, read our interviews with two Malwarebytes Directors:

The Malware War: Expert Advice from the Front Lines (March 2016)
The Malware War: The State of Malware on Mac (April 2016)

web-filtering-security

Web Filtering & Security

Malware infections and data breaches can happen after an employee innocently downloads the wrong app, clicks on the link in a suspicious email, or checks their personal email at work.  While you can make rules governing time employees spend online, enforcing said rules is difficult.

Unless you install Web filtering with Forcepoint.  The Forcepoint solution makes it easy to roll out protections against time-wasting (or malware-infected) websites.  Protections employees cannot ignore.

How does it work?  Forcepoint runs within your business’ network, controlling what employees can and cannot access on it, and saving company bandwidth.

Are your employees browsing or streaming when they should be working?  Forcepoint will keep them on task (and help you keep dangerous URLs from infecting the network).

By running Forcepoint, you both increase employee productivity and guard against malware-infected websites.

  • Increase Productivity – Forcepoint puts policy controls into place network-wide, including time quotas, bandwidth limits, and specific URL blocking.  If employees can’t get to YouTube or Facebook, they can’t waste hours there. 
  • Block Dangerous/Non-Work URLs – Forcepoint’s Threatseeker blocks Web threats to prevent malware infections and data breaches.  Forcepoint stays ahead of threats by collecting and analyzing 5 billion global incidents every day. Once analysis completes, each Forcepoint installation receives threat analytics . . . at up to 3.2 updates per second. 

To find out how Forcepoint can help you, click the Contact Us box on the right.

mobile-device-management

Mobile Device Management

The more we rely on mobile devices like smartphones and tablets, the faster security for these devices must evolve.  If your company allows BYOD, then you’ll need a way to protect the company data on those devices.  Mobile Device Management (MDM) is the solution.

Using an MDM platform, you can keep company data separate from personal data on any mobile device, and safeguard it, even if a theft occurs.

A lost device is a problem, but company data on that device falling into the wrong hands can be catastrophic!  MDM mitigates the dangers of lost or stolen devices.  Sometimes it can even help track down the thief & reclaim the device.

These are two MDM solutions PlanetMagpie supports and recommends.

  1. MaaS360 – Created by IBM, MaaS360 handles mobile device management and updates.  It includes functions like pushing software updates, inventory control, remote wipe, and support for managing laptops on the go—something critical for those employees travelling
  2. AirWatch – Highly configurable for keeping track of mobile devices, monitoring their activity, encrypting data, and protecting them against malware.  Works well on iOS and Windows devices.

If your office uses mobile devices, or allows employees to use their own devices, Mobile Device Management is a necessity to protect your data.  Request a quote for Mobile Device Management setup by clicking the Contact Us box on the right.

emailFilteringLB

Email Filtering

Email systems such as Exchange Server and Office 365 incorporate a filter to block spam and malware.  They don’t always work.  Spam or phishing emails can still make it through.

The solution?  Real, business-grade email filtering.  Enter modusGate.  Developed by Vircom, modusGate’s enterprise-grade protection looks for (and blocks) viruses, phishing attempts, and even DoS (Denial of Service) attacks.  Only after modusGate determines an email is safe, do you see it in your inbox.  This keeps your entire organization safe by blocking malware before it gets in.

modusGate also preserves email, in case of disaster.  It will spool (hold) your mail for up to 72 hours as a precaution.  If power goes out in your office, don’t worry, your email is preserved.

Why should you trust modusGate?  Because we use it ourselves.  PlanetMagpie isn’t just a Vircom Partner; we’ve used modusGate on our own email servers for years.  It keeps our email, and our customers’ email, clean and secure.  We recommend it to you because it’s proven itself to us.

To learn more about Vircom’s modusGate, visit our Email Filtering page.

networksecurity-appdelivery

Application Delivery & Security

In today’s world, securing applications is every bit as important as delivering them.  Malware, ransomware, legions of hackers . . . the Web is a battleground.  Any software application that connects to it needs protection, or it could become a gateway to your data.

To secure your applications in-transit and during operation, PlanetMagpie has partnered with F5, a leading company in application delivery services.  Using F5’s products and services, PlanetMagpie helps our clients optimize delivery of their secured network-based applications.

Contact PlanetMagpie today to speak with a Cybersecurity Engineer about the F5 suite of products and services!

F5 products provide:

  • High Availability—applications are delivered to any device, anytime, anywhere
  • Performance Optimization—applications load quickly and perform flawlessly
  • Application Security—work securely from anywhere
  • Data Center Security—protects Internet-facing data center applications wherever they reside
  • Identity and Access Management—enables single-sign on and federation of application access across the data center and into the cloud