Data Transit & Encryption Experts

High Performance, Secure, Low Latency and Contention

Powered by 100% Renewable Energy

The only GREEN UK Service Provider with EnergyStar, ISO14001 and an ALL ELECTRIC FLEET

Network Security

Cutting edge and comprehensive Network & Data Security Solutions.

Supplying the very best in class hardware solutions

The Latest Generation Servers from Hewlett Packard

When speed and latency really matter

GEN has the options for you

Unified Communications

Brings your computer, tablet and phone closer together

State of the Art Green DataCentres

Using the latest technology and Power Management

Comprehensive Software and Systems Development

PHP, ASP, C++, C#, Javascript, Python, HTML, CSS and more.

High Performance and Specialist Workstations

For those who simply want more

pinit_fg_en_rect_red_20 GEN - GEN Security Auditing

gensecurity_small GEN - GEN Security Auditing

Even the most basic connectivity implementation can have holes in it, from switching/routing firmware flaws to inadvertently enabled VPN protocols or badly configured firewall rules and that's what Network Security Auditing is all about, an impartial double check of the security measures you've already implemented. During the audit we will attempt direct and indirect exploitation of your systems to reveal any possible issues with the network fabric, then we'll turn to what is by far the largest risk to security, the staff. Giving staff access to ONLY what they require to do their job has been the default position on network security since the 70's but its so often the case in smaller companies that staff have access to way more than they need, sometimes even administrative privileges! Below is a very simple overview of the audit process: 

  • Analyse network security from the public internet - check for vulnerabilities and exploits. 
  • Analyse network security from the LAN (or WAN) - check for vulnerabilities, exploits, and sample the data stream for unknown or suspicious packets. 
  • Analyse the LAN for RAT (Remote Access Tools) that have been willingly or unknowingly installed and have open connections to the internet. 
  • Run a full security scan of storage and fabrics. Ensure that corporate data is secured in such a way that would make its compromise very hard. 
  • Analyse user permissions, reach and effect. Look at password strengths, two factor authentication, and of course post-it notes with passwords on them stuck to the front of PC's. 
  • Analyse cloud based services for security and resilience. 
  • Analyse anti-virus and IDS systems for effectiveness. 
  • Analyse Wifi Networks, connectivity and compromises. 
  • Analyse laptops, tablets, and other remote solutions which may or may not have an impact on network security. 
  • Analyse Staffing risks, single point of failures, and high risk individuals. 

And then we write a full and detailed report of our findings with recommendations at each stage. Once all the issues have been resolved we'll re-audit again to confirm. Security Auditing is priced sensibly on a day rate basis, and one day is often sufficient for small businesses with one connection. Larger organisations may take several days or more but we will be able to provide an estimation prior to commencing any work.

If you think your business would benefit from a Security Audit then contact us today for more information! 

Cyber Exchange Member Badge FullGEN has been accepted as a member of the UK's Government Backed Cyber Exchange

The Cyber Exchange is a fantastic place to find Security Companies, Resources and News relating to Cyber Security within the UK. GEN has for many years been providing highly responsive cyber, network and email security solutions and services. Our Antispam and Antivirus gateways protect your organisation from email based threats and our Internet Gateways likewise protect your organisation from internet based threats. We offer some of the highest security encrypted connections as well as encrypted telephony and premises security. 

 

Yesterday I was making a presentation to one of our customers, leveraging the power of the IPad to their board of directors as an easy to use, foolproof interface to the company's operating status. The proposal was to supply iPad Pro's to e

...

api

GEN have for decades now had a comprehensive data processing and analysis service and data supply both inwards and outwards can be via 

SFTP (Secure File Transfer Protocol), a mature system for transferring data into, out of and synchron

...

A single surveillance vendor has garnered a monopoly on training law enforcement in California on the use of automated license plate readers (ALPRs)a mass surveillance technology used to track the movements

We are HP Partners and as such can supply the full range of Hewlett Package hardware and software. We are specialists in HP Netservers from generation 2 awards. We can offer outsourced supply and support for the full range of HP DL/ML and B

...