Network Security

Cutting edge and comprehensive Network & Data Security Solutions.

Supplying the very best in class hardware solutions

The Latest Generation Servers from Hewlett Packard

When speed and latency really matter

GEN has the options for you

Unified Communications

Brings your computer, tablet and phone closer together

State of the Art Green DataCentres

Using the latest technology and Power Management

Even the most basic connectivity implementation can have holes in it, from switching/routing firmware flaws to inadvertently enabled VPN protocols or badly configured firewall rules and that's what Network Security Auditing is all about, an impartial double check of the security measures you've already implemented. During the audit we will attempt direct and indirect exploitation of your systems to reveal any possible issues with the network fabric, then we'll turn to what is by far the largest risk to security, the staff. Giving staff access to ONLY what they require to do their job has been the default position on network security since the 70's but its so often the case in smaller companies that staff have access to way more than they need, sometimes even administrative privileges! Below is a very simple overview of the audit process: 

  • Analyse network security from the public internet - check for vulnerabilities and exploits. 
  • Analyse network security from the LAN (or WAN) - check for vulnerabilities, exploits, and sample the data stream for unknown or suspicious packets. 
  • Analyse the LAN for RAT (Remote Access Tools) that have been willingly or unknowingly installed and have open connections to the internet. 
  • Run a full security scan of storage and fabrics. Ensure that corporate data is secured in such a way that would make its compromise very hard. 
  • Analyse user permissions, reach and effect. Look at password strengths, two factor authentication, and of course post-it notes with passwords on them stuck to the front of PC's. 
  • Analyse cloud based services for security and resilience. 
  • Analyse anti-virus and IDS systems for effectiveness. 
  • Analyse Wifi Networks, connectivity and compromises. 
  • Analyse laptops, tablets, and other remote solutions which may or may not have an impact on network security. 
  • Analyse Staffing risks, single point of failures, and high risk individuals. 

And then we write a full and detailed report of our findings with recommendations at each stage. Once all the issues have been resolved we'll re-audit again to confirm. Security Auditing is priced sensibly on a day rate basis, and one day is often sufficient for small businesses with one connection. Larger organisations may take several days or more but we will be able to provide an estimation prior to commencing any work.

If you think your business would benefit from a Security Audit then contact us today for more information! 

 

 

As you may well be aware, GEN as a organisation is all about climate change, low energy and green initiatives. We work hard to ensure that our operations have minimal impacts on the environment and our fleet is no exception. In 2014 we s

...

For Service Providers, Outsourcing Hardware, Infrastructure or Connectivity is a proven way to reduce costs and increase coverage especially for smaller teams. We've had an active Reseller and Partnership channel for the last 25 years and

...

When social media platforms enforce their content moderation rules unfairly, it affects everyones ability to speak out online. Unfair and inconsistent online censorship magnifies existing power imbalances, giving people who already

Apple are probably one of the best known technology manufacturers having been in the business for more than twenty years. GEN are both Apple Partners and Apple Developers investing heavily in Apple based products and services in house and w

...