Unified Threat Management – without compromise (UTM) Unified Threat Management and Next Generation Firewall solutions have evolved to address the fundamental need of IT managers to maximise both security and its return on investment. The proven answer to this challenge is to consolidate multiple technologies in a single all-in-one solution. While such consolidation can significantly reduce costs, many UTM solutions, while performing acceptably as firewalls, struggle to maintain adequate performance when other critical protection such as intrusion prevention is enabled. DKB SOLUTIONS offers NETASQ UTM solutions come with all critical levels of protection enabled by default and due to their unique architecture, deliver this protection without compromising performance or control NETASQ has a whole array of solutions: The U-Series to meet the requirements of companies of all sizes with optimal network protection. The NG Series which is more specifically dedicated to ensure servicecontinuity in highly demanding environments. The Virtual Appliance range specifically designed for virtual networks. Virtual Network Security Appliance V50, V100, V200 & V500 The benefits provided by virtualization, particularly for SMBs are clear: cost reduction, resource optimization and easier service deployment and management, in addition to faster data recovery. However virtualization enables multiple services, many with different trust levels, to run on the same physical platform. This is a practice that requires powerful solutions to secure traffic flowing between each of the virtual machines. As it is not possible to place a traditional firewall within a virtual network, the best way to monitor communication in a virtual environment is to deploy a virtual security appliance. SECURING YOUR VIRTUAL NETWORK ENVIRONMENT Virtual machines host the same Operating Systems, CRM, ERP and business critical applications as physical servers, with multiple virtual machines now sharing asingle hardware platform. Email and web servers, which were traditionally located in the DMZ, can therefore be hosted in the same environment as production servers, making the latter potentially more accessible. As you move from a physical environment to a virtual network, you need a proactive, all-in-one virtual security appliance to ensure that all your protection requirements continue to be met. A mature, IPS-based Unified Threat Management solution with an integral real-time analysis will enable you to benefit from all the advantages of virtualization, including load-balancing, portability and fast data recovery. NETASQ’s zero-day Intrusion Prevention System lies at the heart of all Virtual Appliances for SMBs. Located in the system kernel, it embeds firewall, antivirus and antispam functionality. It also includes protection for your VoIP traffic and supports both IPSec and SSL VPN tunnels ensuring full protection of your inter-site communications. The NETASQ engine analyzesnetwork protocols and applications to detect and block threats, delivering outmost security by dramatically reducing the risk of false alarms thanks to behavioral analysis, coupled with a range of contextual signature databases. REDUCING COST To remain competitive, small and medium businesses need to minimize the costs of their IT infrastructure, which often leads to compromises as to the quality of the deployed IT services. Taking this into account, with NETASQ Virtual Appliances for SMBs organizations can benefit from the full range of security features at no initial cost, by just subscribing for the services, which include firmware and protection updates. The benefits of an annual subscription are clear: drastic reduction of IT security costs, full cost control, rapid return on investment on a state-of-the-art protection. Managed Network Services Setting up, maintaining, and troubleshooting a network is a huge job no matter the size of the network. Many small and medium sizedbusinesses are now looking to outsource network maintenance to managed network services providers because of the cost savings as well as other key factors. All inclusive package DKB SOLUTIONS offers many managed IT services designed for the small to midsized business that offers you a complete IT services package so you can run your business without all the work. The best part? It requires no management on your part. A Team of Experts DKB SOLUTIONS offers an entire team of managed network services engineers to give you the support and maintenance you need to keep your network up and running. Engineers are Microsoft Gold certified and carry certifications from other leading IT industry vendors as well. When you hire DKB SOLUTIONS, you don’t just get one IT professional, you get the combined experience of an entire team! A Proven Process DKB SOLUTIONS prides itself on the processes we have developed over the years to create top tier managed network services plans. We first started bysurveying the customer and implemented the ideas they gave us. Next we analyzed our service delivery process. We found places for improvement and made sure to reinforce any areas where an issue might occur. The process was then detailed out on a printed blueprint and taught to each engineer. The result is a proven process that takes into account the voice of the customer and tried and true management practices to deliver the best managed network services available. Cost Savings Before a new client comes on board with DKB SOLUTIONS, we make sure to provide an initial network assessment. During the assessment we take inventory of the equipment present on the network then compare their current network cost to a solution from DKB SOLUTIONS. In almost all cases the DKB SOLUTIONS solution comes out saving the company money as well as increasing efficiencies and paving a way for IT to act as a competitive advantage for the company. Someone is Always Here In a traditional office setting with ahired on IT manager, whenever that IT manager is sick or on vacation to knowledge of the network goes on vacation with him. Not to mention if that employee decides to move on to another opportunity, much of the network processes and inter-workings are lost, and a new employee must start from the ground up. With a managed network services provider like DKB SOLUTIONS, you don’t have that problem. Everyone on our team is trained on your network, with a primary and secondary contact available who are the true experts on your network. Processes for your network, as well as a full network topology are created that you are free to take with you should you decide to move on to another provider. Plus, DKB SOLUTIONS provides around the clock monitoring and maintenance of your network so you are never without the support you need. EndPoint Access Security We partner with Lumension® the best suite of EndPoint Management and Security products. Lumension Device Control Lumension ® Device Control isan award-winning leader in preventing data loss / theft via removable devices / media, and is available as a modular offering on the Lumension® Endpoint Management and Security Suite. With Lumension® Device Control, organizations can quickly identify all endpoint-connected devices in their environment and flexibly enforce a comprehensive security policy that prevents unauthorized use, limits malware intrusion, and forces encryption of sensitive data. Lumension® Application Control Lumension® Application Control is the market-share leader in application whitelisting and is available as a modular offering on the Lumension® Endpoint Management and Security Suite. With Lumension® Application Control, IT administrators can quickly identify all applications running in their environment and enforce a comprehensive whitelist policy that prevents unauthorized applications, malware and un-trusted change. Lumension® Application Control overcomes the traditional challenges associated withstand-alone, point application control products through innovative features that add both whitelist management flexibility and ease-of-use Lumension®Scan – Vulnerability Assessment Scanner Complete, Real-Time Network Visibility and Proactive Vulnerability Assessment and Prioritization with Lumension® Scan Vulnerability Assessment Business Issues and Challenges Today’s enterprise has virtually become borderless; devices are brought in and out of the environment due to increased workforce mobility. Organizations no longer have visibility into what systems and applications are running on the network at any given time. This makes it almost impossible to identify which vulnerabilities may exist within the network environment Security vulnerabilities are growing exponentially. Malware has increased by 500%, and major AV firms are falling behind on documenting known signatures.ｹ A July 2008 studyｲ highlighted that 6437 new vulnerabilities were disclosed and nearly 410,000 new examples ofmalware, including viruses, worms, back doors, key loggers, Trojans, spyware, and rootkits were released the previous year. Even more alarming is that 90% of security vulnerabilities could be exploited remotely, i.e. over the networkｳ. It痴 evident that organizations need a solution that addresses all of these concerns and improves their security posture; one that allows real-time visibility and proactive vulnerability management Lumension® Patch and Remediation? Lumension® Patch and Remediation is the world’s leading patch management solution, and is available as a modular offering on the Lumension® Endpoint Management and Security Suite. With Lumension® Patch and Remediation, IT administrators can automatically identify and patch vulnerabilities across heterogeneous operating systems, Microsoft and non-Microsoft applications, and endpoint configurations – all of which is seamlessly managed through a single console. Security Configuration Management As IT environments have becomeincreasingly complex, supporting virtual and distributed platforms, companies must ensure that they maintain control of their information and system management. IT organizations must manage multiple point-based technologies, which add complexity and cost. A new approach is required to simplify the IT environment and ensure enhanced security and IT risk management with the lowest total cost of ownership possible Such a solution is particularly important to effectively manage endpoint configurations. With end users regularly able to download and install software, application conflicts can occur ultimately reducing user productivity and increasing IT operating costs due to security incidents and help desk overhead. Proactively monitoring configurations is just as important as rapidly applying critical patches because 60 percent of all exploited vulnerabilities are due to insecure configurations.ｹ Government regulations and industry standards are recognizing this, which explains the recentinflux of security configuration management requirements. Without holistic visibility and standardization of endpoint configurations, IT administrators can’t possibly know or manage all of the applications in the environment. A solution is needed that allows organizations to enforce a consistent endpoint configuration policy and continuously monitor and report on its adherence.