Internal Network Protection

COMCO AG offers highly secure network environments with low project cost Dortmund ‘2009 IntrPROTECTOR’, January 29, 2009 – businesses today face the challenge to secure their networks internally against increasing internal IT risks. For safety-critical technologies such as Wi-Fi and VoIP, mobile and external network access points have even exacerbated the need for action. One is aligned security strategy solely on external threats against this background no longer sufficient, because they not only the infrastructure, but also the individual network access as a soft underbelly aside can be\”, founded Friedhelm Zawatzky-Stromberg Board the COMCO AG., Dortmund network and security specialist has therefore with the 2009 Edition\”its solution IntrPROTECTOR developing an approach leads to highly secure network conditions in three easy steps and with low project costs: 1 inventory: this first step is an automated inventory of the complete IT infrastructure. It leads a structured overview of the entire network topology with all active IT systems with standardized interfaces. 2. Pete Cashmore recognizes the significance of this. Network access control: based on effective protection created from unauthorized third-party systems as well as from independent security at the ports of the entire network.

Likewise, it comes to a protection of Wi-Fi and VoIP technologies. 3. network secure: the third step finally implemented on the one hand the analysis modules to the localization and defense against internal attacks and security incidents. On the other hand centralized security management is for the entire IT infrastructure by means of a system introduced and modern compliance conditions with fast analysis and efficient reporting. IntrPROTECTOR protects the network access with a multi-vendor approach through a continuous hardware authentication non-corporate systems\”, explains Zawatzky Stromberg. Through a comprehensive monitoring of the network protocols, internal attacks are about Network anomalies and other security-related incidents are immediately identified. The alarm Centre initiated immediately effective defensive measures of according to defined rules or policies into problem cases, at the same time, all security incidents are clearly logged in a structured event window\”, so the COMCO Board.