Firewall and VPN solutions from Nowcomm.
Protect your business from the outside, on the inside.

Visibility

Threats and malware are more sophisticated than ever, and cybercriminals are unrelenting in their attacks. Threats of data loss, outage and a compromised network security impacts to your reputation and brand, can take years to recover from, whilst absorbing tens, hundreds to millions of pounds worth of lost revenue. That’s why we have a host of solutions around Firewalls and VPNs to protect your business from the outside, on the inside.

Firewalls

Today’s firewalls not only need to prevent attacks to protect the environment and stop malware and cyberattacks coming into the network, but also provide the detailed visibility to uncover those attacks and block them from regaining entry, and to provide learnings about unusual behaviours and activities on the network. This is where Cisco’s Next Generation Firewalls (NGFW) really help ease the management and administration of your security landscape via automation.

A NGFW will allow you to login and set up a customised view for each administrator. View your top attackers and intrusion events. Then this will allow more in-depth research if anything unusual is recognised and detected.

Next Generation Firewalls provide a customised view of activity

A NGFW will allow you to login and set up a customised view for each administrator. View your top attackers and intrusion events. Then this will allow more in-depth research if anything unusual is recognised and detected.

The importance of detailed, actionable data

When at risk of an attack, it is crucial that the data is specific, detailed, and actionable. NGFW’s needs to analyse your environment, analyse your devices: including what operating system is at risk, what protocols and what applications are being run, for example. This then allows further investigations and required measures to be out in place.

Firewalls

“Remember attackers need to get things right just once, but the defender needs to be right all the time 24 hours a day, 7 days week, 365 days a year”

What is a Snort Rule?

Snort is an open source network intrusion prevention system (IPS) by Cisco. It can perform real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching and matching, and detect a variety of attacks and probes. Nowcomm will work with you to customise your Snort Rue set to allow for easy maintenance of your rule base and to reduce administrative tasks and ease ongoing manageability and accuracy of your data.

By working with leading IT Specialist and systems integrator Nowcomm, we will ensure that your firewalls give you the expert visibility you need and inform the right people in your business – and just as crucially, at the right time. We will set all your reports for you and help you learn how to get the most from your solution.

Speed and Accuracy

The FirePOWER centre manager allows administrators to see a list if which IP addresses have been compromised on the network, allowing them to act at speed and accuracy. To better understand the nature and type of the attack, the FirePOWER centre manager allows administrators to select on each compromised IP address each IP address listed in the console, so administrators can see the type of attacks, the types of applications and protocols being used and on which device. This is critical and allows decisions to be made dependent on the appropriate nature of the device being impacted.

Firepower manager Centre

Security Intelligence

Fed by the Talos environment, there are a series of different intelligence areas FirePower manager centre allows access and detail reporting behind. For example, the Command Centre information needs to be watertight and should not be going out of the network environment. This may be something that your security team will want to see immediately, to verify and confirm at speed.

Virtual Private Network (VPN) solutions from Nowcomm

A VPN creates a virtual, secure LAN across the internet. It puts your home computer, laptop, or phone on the same local network as the office one, just as if your computer were inside the building of the remote office.

VPN solutions are increasing in importance and demand due to the influx of remote working. Secure access to your network is created from outside the LAN, ensuring all traffic can remain monitored and a detailed analysis of any vulnerabilities can be explored and detected in a timely manner by your IT and security infrastructure teams.

1. Secure Endpoint Mobility Clients

Providing all users with a VPN endpoint client is essential to ensure all devices are secured and have correct access and controls when accessing and retrieving files and sending and receiving data and emails across a variety of different devices.

Centralising the view of these endpoints is necessary to keep the network data up to date and to identify and protect the network from any weaknesses. It also helps to then correct behaviours and educate employees as to what to access, phishing emails and malware attacks and the signs to look out for. See our people security pages for more information.

Nowcomms expertise in delivery of secure mobile endpoint clients is across a broad set of platforms, including Windows, macOS, Linux, iOS, Android, Windows Phone/Mobile, BlackBerry, and ChromeOS.

A WebVPN or SSL VPN feature in Cisco IOS software, allows for secure remote user access to an enterprise network from anywhere on the Internet. The SSL VPN gateway allows remote users to establish a secure VPN tunnel using a web browser.

Find out more about Nowcomm endpoint security solutions and Cisco Anyconnect VPN.

To get the most from your Anyconnect deployment, we also recommend Cisco Umbrella and Amp for Endpoints.

Download this useful whitepaper to find out the five key ways how VPN and MFA will help to secure your remote worker environment further.

Download this useful whitepaper to find out the five key ways how VPN and MFA will help to secure your remote worker environment further.

2. What is a Site to Site VPN?

A site-to-site virtual private network (VPN) is a connection between two or more networks, such as a corporate network and a branch office network. Many organizations use site-to-site VPNs to leverage an internet connection for private traffic as an alternative to using private MPLS circuits.

In order to set up an internet-based site-to-site VPN between two sites, a VPN gateway (router, firewall, VPN concentrator, or security appliance) such as the Cisco Adaptive Security Appliance (ASA) is required at both sites.

What is the difference between a Site to Site VPN and a remote access VPN?

• Site-to-site VPNs are frequently used by companies with multiple offices in different geographic locations that need to access and use the corporate network on an ongoing basis. With a site-to-site VPN, a company can securely connect its corporate network with its remote offices to communicate and share resources with them as a single network.

• A remote access VPN is a temporary connection between users and headquarters, typically used for access to data centre applications. This connection could use IPsec, but it is also common to use an SSL VPN to set up a connection between a user’s endpoint and a VPN gateway.