Network Security Technical Support Hawaii | MFA | Citrix Netscaler | Sonicwall | Watchguard | MalwareBytes | Trend Micro | Disk Encryption | SSL | TLS | L2TP | Firewall | Load Balancer

Network Security

Call us to schedule a FREE initial consultation and demonstration.

Multi-layer Network Security

Security used to be a secondary topic 20 years ago. Today, it’s becoming top of mind in most discussions. Security could be as simple as preventing employees from finding the HR excel spreadsheet or to allow a salesperson to view, but not save, to the customer file in the accounting system.

But something as simple as setting up anti-virus software gets out of hand because two or more are installed on the computer. More is not always better.

Three common questions that come up often:

#1 - Is wireless access secure enough to use? Properly set up, it is. Evaluate and configure the access points, the access point controller, firewall, and Windows server core network infrastructure. Monitoring for events that are interesting needs to be captured too.

#2 - When should I consider having a primary password and a secondary password to logon with? This may be needed when you have applications that are exposed on the Internet. You have employees that need to access data from a remote location via the Internet. With multi-factor authentication, a secondary password is sent to a physical device (such as via SMS text to a smart phone) that is used to logon with.

#3 - How come I still get infected, even though I have anti-virus software? The people behind viruses and malware have sophisticated techniques that easily get around a single layer or two of security protection.  The Holy Grail standard of two layer protection – anti-virus software and a firewall - was deemed adequate 10 years ago.  It’s not effective anymore. Additional layers are needed, but just as important are changes to business process and periodic user education.


  • Citrx Netscaler WAF
  • Dell SonicWall
  • Kemp WAF
  • WatchGuard Firewall

Anti-Malware, Anti-Virus

  • MalwareBytes
  • Microsoft
  • Trend Micro

Authentication, Encryption

  • Multifactor Authentication
  • File to Full Disk Encryption
  • SSL, TLS