17. Basic
requirements for
layer 1 security
Average
financial impact
of data breach /
transport
interruption
Basic
requirements for
transport security
Choosing the right protection
for my business
18. THANK YOU
WHAT YOU WANT
FROM YOUR SECURITY VENDOR?
✔ Web Content Filtering and Blocking
✔ Anti-Virus Protection
✔ User-Friendly Interface
✔ 24/7 Support
✔ Best in class Firewall
✔ Secure VoIP
✔ Automated Backup and Recovery
✔ Secure Encryption Technologies
29. Each INA sized and scaled for
increasing employee cohorts.
All EquiiOS devices come standard with:
● Best-in-Class Enterprise-Grade Firewall
● WAN Optimization and Failover (4G/LTE)
● Easy VLAN and L2 Network Management
● Built-in WiFi Access Point
● Bandwidth Optimization and Queuing
● Anti-Virus Protection
● Anti DDoS Protection
● Advanced VPN Encryption Technologies
● Easy to administer integrated VOIP w/Call
Recording, IVR and VoiceMail capabilty
● Network File Storage
● Automated Network Backup
● 24/7 Monitoring and Alerting
● Automatic Updates and In Place Firmware
Upgrades
● Cloud-Hosted EquiiOS Available
(Ask about our Virtual Integrated Network Appliance!)
Much more!
31. THANK YOU
ARE YOU PREPARED?
⎕ Do your employees bring their own devices?
- Are they allowed to plug them into the network?
⎕ Do you have remote workers? (Road Warriors)
- Do they use strongly encrypted VPN technologies?
- Do they use secure voice communication?
⎕ Do you have a data backup policy?
- How often do you review these policies?
⎕ Do you know who to contact in the case of a breach
or imminent threat?
⎕ Do you have a Firewall installed at your location?
- Do you know who manages that firewall?
⎕ Do you have anti-virus and anti-malware software
installed on your PCs?
- Is that software up to date?
⎕ Does your business have an Internet usage
policy?
- How is that policy enforced?