Hardware and Network Solutions
We understand that businesses are looking for 2 key factors
when purchasing office IT Hardware; quality and price.That’s why we have a dedicated production department based in our Hereford office. This allows us to build computers using only researched and trailed hardware, meaning you get reliable, fully-tested systems that will keep your users productive. We also understand that some users in your office will have different requirements, whether it’s a more powerful system for the marketing department, or a small form-factor PC for the warehouse, all these customisations are possible to match your requirements. Also by building the PCs ourselves, it allows us to remain competitive on price as there is no middle man.
Gone are the days of rooms full of stacks of servers in an air conditioned room – some businesses today require only a small box that could fit in your hand. All of our servers are built to spec either by ourselves or through one of our specialist partners should there be a specific requirement. We have experience with units for supporting 2/3 users all the way up to 100s; utilising virtualisation in a multiple host cluster environment, so you can be sure that we will understand the right solution for you. Your business may not even require one!
Laptops and Mobile Devices
Wyvern work with some key vendors to ensure that we can remain competitive within the mobile market. We have partnerships with some of the leading brands and are able to provide devices to any requirement or budget. Of course we also support the equipment so should you need service on the device, we will be able to provide that for you taking the headache away of returning equipment via courier and potentially lengthy time without the device. From simple notebooks for your salesmen on the road, to powerful media machines, we have a wide choice to suit any requirements.
We are able to provide and install HIKVISION CCTV Camera systems. Whether you need an individual camera, or a full security system for your premises, we can deliver and install the entire system for yourself.
As well as installing the cameras, we can set-up a cloud-based solution for yourself, where you can now monitor your CCTV feeds in real-time, via an Application on your phone, or any Web Browser.
Giving you piece of mind, 24-7, you can monitor your cameras from anywhere in the world.
Why use CCTV?
CCTV has numerous advantages, even besides the obvious security benefits it can offer:
CCTV can protect your employees; Many employees are vulnerable in their job role to abuse, be it physically or verbally. CCTV will act as a deterrent to potential abusers, and act as a witness to help combat false allegations.
Hidden CCTV can help to prevent theft, be it unscrupulous customers, or even employees, the presence of cameras can either act as a prevention method, or gather the evidence you need for prosecution.
Footage from CCTV is none disputable, and as a result can help to settle disputes that would otherwise be unsolvable.
Longstanding footage is highly convenient for record keeping. You can monitor stock arrivals, the movements of employees and customers too.
4o’clock phone call that the building alarm is going off? With a cloud-based solution you can check for false alarms without needing to visit the premises.
Network maintenance: Its basically means you have to do what it takes in order to keep a network up and running and it includes a number of tasks:
Troubleshooting network problems.
Hardware and software installation/configuration.
Monitoring and improving network performance.
Planning for future network growth.
Creating network documentation and keeping it up-to-date.
Ensuring compliance with company policies.
Ensuring compliance with legal regulations.
Securing the network against all kind of threats.
Of course this list could be different for each network you work on and perhaps you are only responsible for a number of these tasks.
Not every user should have access to your network. To keep out potential attackers, you need to recognize each user and each device. Then you can enforce your security policies. You can block noncompliant endpoint devices or give them only limited access. This process is network access control (NAC).
Antivirus and antimalware software
“Malware,” short for “malicious software,” includes viruses, worms, Trojans, ransomware, and spyware. Sometimes malware will infect a network but lie dormant for days or even weeks. The best antimalware programs not only scan for malware upon entry, but also continuously track files afterward to find anomalies, remove malware, and fix damage.
Any software you use to run your business needs to be protected, whether your IT staff builds it or whether you buy it. Unfortunately, any application may contain holes, or vulnerabilities, that attackers can use to infiltrate your network. Application security encompasses the hardware, software, and processes you use to close those holes.
To detect abnormal network behavior, you must know what normal behavior looks like. Behavioral analytics tools automatically discern activities that deviate from the norm. Your security team can then better identify indicators of compromise that pose a potential problem and quickly remediate threats.
Organizations must make sure that their staff does not send sensitive information outside the network. Data loss prevention, or DLP, technologies can stop people from uploading, forwarding, or even printing critical information in an unsafe manner.
Email gateways are the number one threat vector for a security breach. Attackers use personal information and social engineering tactics to build sophisticated phishing campaigns to deceive recipients and send them to sites serving up malware. An email security application blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data.
Firewalls put up a barrier between your trusted internal network and untrusted outside networks, such as the Internet. They use a set of defined rules to allow or block traffic. A firewall can be hardware, software, or both. Cisco offers unified threat management (UTM) devices and threat-focused next-generation firewalls.
Intrusion prevention systems
An intrusion prevention system (IPS) scans network traffic to actively block attacks. Cisco Next-Generation IPS (NGIPS) appliances do this by correlating huge amounts of global threat intelligence to not only block malicious activity but also track the progression of suspect files and malware across the network to prevent the spread of outbreaks and reinfection.
Cybercriminals are increasingly targeting mobile devices and apps. Within the next 3 years, 90 percent of IT organizations may support corporate applications on personal mobile devices. Of course, you need to control which devices can access your network. You will also need to configure their connections to keep network traffic private.
Software-defined segmentation puts network traffic into different classifications and makes enforcing security policies easier. Ideally, the classifications are based on endpoint identity, not mere IP addresses. You can assign access rights based on role, location, and more so that the right level of access is given to the right people and suspicious devices are contained and remediated.
Security information and event management
SIEM products pull together the information that your security staff needs to identify and respond to threats. These products come in various forms, including physical and virtual appliances and server software.
A virtual private network encrypts the connection from an endpoint to a network, often over the Internet. Typically, a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.
A web security solution will control your staff’s web use, block web-based threats, and deny access to malicious websites. It will protect your web gateway on site or in the cloud. “Web security” also refers to the steps you take to protect your own website.
Wireless networks are not as secure as wired ones. Without stringent security measures, installing a wireless LAN can be like putting Ethernet ports everywhere, including the parking lot. To prevent an exploit from taking hold, you need products specifically designed to protect a wireless network.
Fault Detection and Prevention
Network Infrastructure Design