(585) 254-1966


Content Filtering
URL filtering, or the ability to control access to Web sites, is critical to minimizing an organization's business risk. Inappropriate Web surfing can lead to decreased worker productivity and the introduction of viruses. Both situations can result in considerable financial costs for any company. Other security breaches occur through inappropriate Web use such as the loss of intellectual property and other proprietary information. Unsanctioned Web-based applications can also consume large amounts of network bandwidth and the viewing of adult content sites by employees can lead to costly lawsuits.
Products:  Trustwave  | IBoss

Packet Shaping (DPI)
Packet Shaping (DPI) refers to the capability of a network to provide better service to selected network traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode, Ethernet and 802.1 networks, and IP-routed networks that may use any or all of these underlying technologies.
Products:  Allot  |  Procera

Anti-Spam filters out unwanted email to make your online communications safer and more enjoyable. Automatic identification of spam makes it easy to block messages you don't want, without interfering with your legitimate email.
Products:  Barracuda  |  Sophos

Protect your end users' systems from today's security threats which are signature-based security options that provide protection.
Products:  Kaspersky  |  Sophos 

Protect your confidential information and ensure regulatory compliance with a range of solutions that deliver policy-based security across mixed environments and operate transparently to your users.
Products:  Sophos | Trustwave

A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Products:  Sophos  |  Watchguard


Network Access Control
(NAC) enables granular control over network access and continuous monitoring of your endpoints to help prevent the spread of malware and other threats that can harm your infrastructure and leave your organization vulnerable to attack..
Products:  Trustwave  |  Impulse Point

Storage Area Network
Storage Area Networks are a high-speed subnetwork of shared storage devices. A storage device is a machine that contains nothing but a disk or disks for storing data. A SAN's architecture works in a way that makes all storage devices available to all servers on a LAN or WAN. As more storage devices are added to a SAN, they too will be accessible from any server in the larger network. In this case, the server merely acts as a pathway between the end user and the stored data.
Products:  Cybernetics  |  Unitrends

Network Behavioral Analysis
Network Behavioral Analysis is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data from many points to support offline analysis. After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network Behavioral Analysis is particularly good for spotting new malware and zero day exploits.
Products:  Riverbed [Cascade]

WAN Acceleration
Wide-area Data Services encompass several different application acceleration categories. Whether you are focused on making the most of your WAN bandwidth by reducing traffic, or on the performance of your global applications, you need a comprehensive solution that addresses all aspects of the problem. Unlike these individual approaches that only address a single aspect of slow application performance on WANs, a complete WDS solution addresses several – ideally all of them – simultaneously.
Products:  Riverbed

Layer 3 Technologies, Inc.
Tel: (585) 254-1966 Fax: (585) 254-2266
Copyright © 2000-2013 All rights reserved
Legal | Privacy | Sitemap