SlideShare a Scribd company logo
1 of 5
Download to read offline
 
                                                                                         	
  SecurityLinx™	
  
                                                                                         	
  
                                                                    Fully	
  Managed	
  UTM	
  Internet	
  Security	
  Solution                                  	
  


                                                                                                                          	
  

                                                                                                                      No	
  business	
  will	
  escape	
  the	
  cost	
  of	
  Network	
  Security.	
  
                                                                                                                      You	
  can	
  either	
  invest	
  now	
  or	
  pay	
  m uch	
  m ore	
  later.	
  

                                                                                                                      Businesses with foresight have an advantage because
                                                                                                                      they attack problems and deal with them proactively.
                                                                                                                      Companies that do not invest in this area will ultimately
                                                                                                                      pay the highest price in lost or stolen data and
                                                                                                                      intellectual property, as well as in damaged equipment
                                                                                                                      recovery and decreased employee productivity.

                                                                                                                      SecurityLinx™ is a smart solution that not only minimizes
                                                                                                                      threats; it actually pays for itself many times over. This
                                                                                                                      product takes the sting out of hiring more personnel and
                                                                                                                      purchasing costly hardware. Best of all, it comes with a
                                                                                                                      100% Satisfaction Guarantee.
                                                                                                            	
  

                         	
     What	
  is	
  SecurityLinx™?	
  
                                	
  
                     •   A	
  fully	
  managed	
  Universal	
  Threat	
  Management	
                                            •     Archiving	
  of	
  emails,	
  IMs,	
  and	
  URLs	
  
                         (UTM)	
  Internet	
  Security	
  Solution	
  	
  	
                                                     •     Weekly	
  Reporting	
  
                     •   Hardware	
  &	
  Client	
  VPN	
  Management	
                                                          •     No	
  hardware	
  purchase	
  required	
  	
  	
  
                     •   Web	
  Content	
  Filtering	
  with	
  Quotas	
                                                         •     Low	
  monthly	
  price	
  starting	
  at	
  $189.95	
  	
  
                     •   Multi-­‐threat	
  protection	
  
              	
  
       RealLinx deploys a Firewall Hardware Device at your site (in NAT or Bridge mode) and works with your LAN
       administrator to add a whole new level of security and productivity tools to your network and business. These include:
                         Web	
  Content	
  Filtering	
                    IM	
  Archiving	
                                  Hardware	
  VPN	
                               Anti	
  Virus	
  &	
  Spam	
  
                         Override	
  Admins	
                             Email	
  Archiving	
                               Client	
  VPN	
                                 Anti	
  Spyware	
  
                         Custom	
  Surf	
  Rules	
                        URL	
  Archiving	
                                 Clientless	
  VPN	
                             Anti	
  Malware	
  
                         Category	
  Quotas	
                             Weekly	
  Reports	
                                Port	
  &	
  Host	
  Mapping	
                  Anti	
  Trojan	
  
                         IM	
  Control	
                                  On-­‐Demand	
  Reports	
                           Intrusion	
  Attacks	
                          Anti	
  Worm	
  
                         Application	
  Control	
                         Customized	
  Reports	
                            DoS/DDoS	
  attacks	
                           Failover	
  Redundancy	
  
       	
  
Archiving	
  and	
  Reporting:	
  	
  Owners,	
  Managers,	
  and	
  HR	
  Directors	
  will	
  absolutely	
  love	
  the	
  Archiving	
  and	
  Reporting.	
  Do	
  you	
  need	
  to	
  know	
  
the	
  content	
  of	
  a	
  specific	
  email	
  or	
  IM	
  that	
  a n	
  employee	
  sent	
  or	
  received?	
  Do	
  you	
  need	
  to	
  know	
  if	
  a	
  user	
  was	
  surfing	
  an	
  unauthorized	
  site?	
  Do	
  
you	
  want	
  to	
  know	
  who	
  your	
  “power	
  users”	
  are	
  and	
  where	
  your	
  network	
  bandwidth	
  is	
  going?	
  It’s	
  all	
  included	
  and	
  easily	
  discoverable.	
  	
  	
  	
  
	
  
Web-­‐filtering	
  =	
  ROI:	
  	
  All	
  businesses	
  face	
  a	
  great	
  challenge.	
  When	
  left	
  unchecked,	
  employees	
  will	
  use	
  the	
  Internet	
  excessively	
  for	
  personal	
  
use.	
  On	
  average,	
  employees	
  spend	
  20%	
  of	
  their	
  workday	
  on	
  non-­‐work-­‐related	
  surfing.	
  The	
  most	
  common	
  abuses	
  are:	
  social	
  networking	
  (such	
  
as	
  Facebook,	
  Myspace,	
  and	
  Twitter);	
  streaming	
  media	
  (such	
  as	
  Youtube,	
  Podcasts,	
  and	
  Webcasts);	
  banking;	
  shopping;	
  online	
  trading;	
  and	
  even	
  
on	
  gambling,	
  games,	
  pornography,	
  and	
  numerous	
  other	
  common	
  HR	
  violations.	
  	
  	
  
	
  
SecurityLinx™	
  dramatically	
  improves	
  productivity:	
  	
  By	
  shutting	
  down	
  or	
  limiting	
  access,	
  employees	
  cannot	
  visit	
  distracting	
  
websites.	
  Studies	
  show	
  that	
  productivity	
  goes	
  up	
  immediately	
  when	
  users	
  cannot	
  access	
  these	
  sites.	
  Employees	
  go	
  back	
  to	
  work!	
  Simple	
  math	
  
will	
  show	
  that	
  if	
  you	
  gain	
  back	
  10%	
  to	
  20%	
  in	
  employee	
  productivity,	
  the	
  positive	
  financial	
  results	
  are	
  staggering.	
  What	
  could	
  your	
  business	
  do	
  
with	
  20%	
  more	
  employee	
  productivity?	
  How	
  much	
  money	
  would	
  those	
  numbers	
  save	
  for	
  your	
  company?	
  
	
  
Custom	
  Web	
  Filter	
  Rules	
  with	
  Time	
  Quotas:	
  	
  We	
  recognize	
  that	
  customization	
  is	
  key	
  in	
  a	
  successful	
  web	
  filtering	
  strategy.	
  We	
  will	
  
help	
  you	
  create	
  up	
  to	
  6	
  custom	
  “Groups”	
  that	
  have	
  different	
  rules	
  applied.	
  	
  OWNER,	
  UPPER	
  MANAGEMENT,	
  HR,	
  MANAGERS,	
  IT,	
  and	
  EMPLOYEE	
  
are	
  common	
  groups	
  types.	
  	
  Each	
  of	
  these	
  can	
  have	
  custom	
  rules	
  applied	
  to	
  allow	
  more	
  latitude	
  and	
  freedom	
  to	
  the	
  groups	
  that	
  need	
  it.	
  	
  Time	
  
quotas	
  can	
  also	
  be	
  added,	
  which	
  allows	
  you	
  to	
  specify	
  the	
  amount	
  of	
  time	
  authorized	
  for	
  sites	
  such	
  as	
  Facebook.	
  	
  Want	
  to	
  allow	
  15	
  minutes	
  per	
  
day	
  for	
  Social	
  Networking	
  and	
  15	
  minutes	
  per	
  day	
  for	
  online	
  banking?	
  	
  No	
  problem.	
  
	
  
HARDWARE	
  
                                                                                           RealLinx	
  uses	
  state-­‐of-­‐the-­‐art	
  and	
  industry-­‐leading	
  hardware	
  to	
  ensure	
  the	
  best	
  possible	
  
                                                                                           performance	
  and	
  results.	
  We	
  are	
  a	
  Gold	
  Partner	
  with	
  Fortinet,	
  a	
  highly	
  respected,	
  industry	
  
                                                                                           leader	
  in	
  the	
  Unified	
  Threat	
  Management	
  (UTM)	
  field.	
  RealLinx	
  uses	
  a	
  combination	
  of	
  Fortigate	
  
                                                                                           Firewalls,	
  Fortianalyzer	
  Reporting	
  Servers,	
  and	
  Fortimanager	
  for	
  centralized	
  management.	
  Our	
  
                                                                                           techs	
  and	
  Engineers	
  are	
  trained	
  and	
  hold	
  both	
  FCNSA	
  (Fortinet	
  Certified	
  Network	
  Security	
  
                                                                                           Associate)	
  and	
  FCNSP	
  (Fortinet	
  Certified	
  Network	
  Security	
  Professional)	
  certifications.	
  
                                                                                    	
  
DESIGN	
                                                                                                                                                                   INSTALLATION	
  
Our	
  Security	
  Engineer	
  will	
  work	
  with	
  you	
  to	
                                                                                                         SecurityLinx™	
  hardware	
  will	
  ship	
  to	
  your	
  location	
  
customize	
  SecurityLinx™	
  to	
  fit	
  your	
  specific	
  business	
                                                                                                  pre-­‐configured	
  for	
  use	
  based	
  on	
  the	
  selections	
  
needs.	
  We	
  start	
  with	
  a	
  basic	
  default	
  template	
  and	
                                                                                                made	
  in	
  the	
  design	
  phase.	
  Note	
  that	
  
let	
  you	
  tweak	
  it	
  as	
  much	
  as	
  you	
  like.	
  Here,	
  you	
  can	
                                                                                     SecurityLinx™	
  is	
  a	
  “Remote	
  Installation,”	
  and	
  
decide	
  on	
  limits	
  and	
  quotas	
  for	
  things	
  such	
  as	
                                                                                                   RealLinx	
  will	
  provide	
  up	
  to	
  3	
  hours	
  of	
  free	
  phone	
  
Facebook	
  and	
  YouTube,	
  or	
  you	
  can	
  eliminate	
  access	
  
                                                                                                                                                                    	
     support	
  while	
  our	
  Security	
  Engineer	
  works	
  with	
  
to	
  them	
  altogether.	
  In	
  this	
  phase,	
  we	
  will	
  look	
  at	
  
                                                                                                            	
                                                             your	
  LAN	
  Administrator,	
  IT	
  Pro,	
  or	
  Consultant.	
  In	
  
your	
  VPN	
  needs	
  and	
  will	
  even	
  work	
  with	
  other	
                                                                                                     smaller	
  offices	
  and	
  networks,	
  it	
  is	
  possible	
  for	
  our	
  
providers	
  and	
  devices	
  to	
  interconnect	
  our	
  hardware	
                                                                                                     Engineers	
  to	
  work	
  with	
  your	
  non-­‐technical	
  
to	
  theirs.	
  You	
  may	
  also	
  choose	
  between	
  NAT	
  or	
                                                                                                    personnel,	
  however,	
  using	
  an	
  IT	
  Pro	
  is	
  
Bridged	
  mode.	
  The	
  Bridged	
  mode	
  lets	
  your	
  existing	
                                                                                                   encouraged.	
  	
  Note	
  that	
  the	
  same	
  Security	
  
network	
  and	
  VPN	
  settings	
  remain	
  unchanged	
  while	
                                                                                                        Engineer	
  that	
  designed	
  your	
  solution	
  will	
  also	
  be	
  
we	
  add	
  in	
  the	
  layers	
  of	
  Security	
  you	
  are	
  missing.	
                                                                               	
            the	
  one	
  that	
  works	
  with	
  you	
  to	
  install	
  it.	
  	
  	
  


                                                         TESTING	
  &	
  TRAINING	
  
                                                         After	
  installation,	
  RealLinx	
  will	
  perform	
  a	
  series	
  of	
  tests	
  to	
  ensure	
  that	
  all	
  systems	
  are	
  functioning	
  and	
  that	
  your	
  
                                                         new	
  Security	
  Services	
  are	
  performing	
  per	
  the	
  initial	
  design.	
  	
  After	
  the	
  initial	
  testing,	
  we	
  allow	
  up	
  to	
  60	
  days	
  of	
  
                                                         unlimited	
  free	
  tweaks	
  and	
  changes	
  to	
  make	
  100%	
  sure	
  you	
  are	
  fully	
  satisfied.	
  
                                                         The	
  same	
  Engineer	
  that	
  performed	
  your	
  design	
  and	
  installation	
  will	
  also	
  walk	
  you	
  through	
  every	
  step	
  necessary	
  to	
  
                                                         access	
  the	
  amazing	
  wealth	
  of	
  information	
  stored	
  in	
  the	
  Archiving	
  Server.	
  	
  You	
  will	
  also	
  receive	
  a	
  comprehensive	
  
                                              	
         guide	
  that	
  details	
  every	
  step	
  of	
  the	
  training.	
  	
  	
  

                                                                                                                                                                              SUPPORT	
  
PROACTIVE	
  REPORTING	
                                                                                                                                                      24•7•365	
  Live	
  phone	
  support	
  is	
  part	
  of	
  
Every	
  Monday	
  (or	
  whatever	
  day	
  you	
  prefer)	
  you	
  will	
  receive	
  a	
  detailed	
  report	
  of	
  what	
                                              the	
  package.	
  	
  O ur	
  support	
  office	
  is	
  
occurred	
  on	
  your	
  connections	
  to	
  the	
  Internet	
  during	
  the	
  previous	
  week.	
  	
  Who	
  used	
  the	
                                              manned	
  and	
  your	
  system	
  is	
  proactively	
  
most	
  bandwidth?	
  	
  Who	
  attempted	
  to	
  reach	
  the	
  most	
  blocked	
  sites?	
  	
  What	
  are	
  the	
  
                                                                                                                                                                              monitored	
  for	
  outages	
  Monday	
  –	
  Friday	
  
most	
  accessed	
  sites	
  by	
  your	
  users?	
  	
  Who	
  sends	
  and	
  receives	
  the	
  most	
  Instant	
  
                                                                                                                                                                              from	
  7am	
  to	
  7pm	
  C ST	
  and	
  phone	
  
Messages?	
  	
  Now	
  you’ll	
  know	
  all	
  of	
  this	
  and	
  so	
  much	
  more.	
  
                                                                                                                                                                              support	
  is	
  available	
  around	
  the	
  clock.	
  	
  If	
  
	
  
ARCHIVING	
                                                                                                                                                                   your	
  unit	
  fails,	
  we	
  will	
  have	
  another	
  one	
  
Want	
  to	
  know	
  what	
  someone	
  said	
  via	
  IM	
  10	
  minutes	
  ago?	
  	
  Want	
  to	
  see	
  an	
  email	
                                                 to	
  you	
  overnight	
  on	
  any	
  non-­‐holiday	
  
exchange	
  between	
  an	
  employee	
  and	
  a	
  client?	
  	
  Want	
  to	
  see	
  if	
  an	
  employee	
  was	
  surfing	
                                             Monday	
  –	
  Friday.	
  Your	
  support	
  package	
  
a	
  website	
  that	
  violates	
  your	
  policies?	
  	
  Simply	
  log	
  into	
  your	
  portal	
  and	
  see	
  what	
  is	
                                            includes	
  unlimited	
  tweaks	
  and	
  revisions	
  
happening.	
  	
  Months	
  of	
  data	
  are	
  stored	
  (sizing	
  based	
  on	
  plan	
  chosen	
  &	
  additional	
  space	
                                             for	
  the	
  first	
  60	
  days	
  and	
  one	
  hour	
  per	
  
may	
  be	
  purchased).	
  	
  This	
  tool	
  is	
  essential	
  for	
  today’s	
  HR	
  liabilities	
  and	
  can	
  provide	
  you	
                                      month	
  of	
  additions,	
  moves,	
  and	
  changes	
  
with	
  the	
  evidence	
  you	
  need	
  to	
  confirm	
  your	
  suspicions	
  or	
  to	
  put	
  your	
  mind	
  at	
  rest	
                                              thereafter.	
  	
  Additional	
  changes	
  can	
  be	
  
regarding	
  these	
  crucial	
  issues.	
                                                                                                                                    made	
  at	
  the	
  low	
  rate	
  of	
  $120	
  per	
  hour	
  
                                                                                                                                                                              (in	
  quarter	
  hour	
  increments).	
  

                                                     SATISFACTION	
  GUARANTEED	
  
                                                     One	
  of	
  the	
  m ost	
  exciting	
  features	
  of	
  SecurityLinx™	
  is	
  that	
  there	
  is	
  no	
  risk	
  to	
  try	
  the	
  service.	
  You	
  have	
  30	
  days	
  from	
  the	
  
                                                     date	
  of	
  the	
  installation	
  to	
  evaluate	
  SecurityLinx™	
  without	
  any	
  concern	
  of	
  being	
  tied	
  to	
  a	
  contract.	
  If,	
  at	
  the	
  end	
  of	
  the	
  
                                                     trial	
  period,	
  you	
  are	
  not	
  completely	
  convinced	
  that	
  SecurityLinx™	
  is	
  worth	
  every	
  penny	
  of	
  your	
  investment,	
  send	
  the	
  
                                                     hardware	
  back	
  and	
  all	
  charges	
  (other	
  than	
  shipping	
  and	
  activation)	
  will	
  be	
  refunded	
  and	
  the	
  contract	
  nullified.	
  We	
  are	
  
                                                     convinced	
  that	
  you	
  will	
  realize	
  ROI	
  within	
  the	
  first	
  30	
  days,	
  however,	
  if	
  we	
  do	
  not	
  meet	
  your	
  expectations	
  FOR	
  ANY	
  
                                                     REASON,	
  we	
  will	
  graciously	
  refund	
  the	
  monthly	
  service	
  charges	
  and	
  thank	
  you	
  for	
  the	
  opportunity	
  to	
  serve	
  you.	
  
                                       	
  
 
                                                                       	
  
                                                                       	
  
                                                                       	
  
                                                                       	
  

	
  
       Sample	
  Reports	
  –	
  User	
  Web	
  &	
  IM	
  Traffic:	
  	
  
       	
  




                                                                	
  	
               	
  




                                                                	
                   	
  




                                                                	
                     	
  
 
                                                                       	
  
                                                                       	
  
                                                                       	
  
                                                                       	
  

	
  
       Sample	
  Reports	
  –	
  User	
  P2P	
  (Bit	
  Torrent)	
  &	
  Email	
  Traffic	
  &	
  AV	
  Attacks:	
  	
  
       	
  




                                                                	
                                                         	
  




                                                                	
                                                         	
  




                                                                	
                                                                	
  
 
                                                                       	
  
                                                                       	
  
                                                                       	
  
                                                                       	
  

       	
  
              Sample	
  Reports	
  –	
  Bandwidth,	
  Protocol,	
  Sessions,	
  and	
  Archiving:	
  	
  
              	
  




                                                                	
                                          	
  




                                                                	
                                                 	
  




                                                                	
                                                 	
  
	
  

More Related Content

Featured

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Security Linx™UTM Solution Brief

  • 1.    SecurityLinx™     Fully  Managed  UTM  Internet  Security  Solution     No  business  will  escape  the  cost  of  Network  Security.   You  can  either  invest  now  or  pay  m uch  m ore  later.   Businesses with foresight have an advantage because they attack problems and deal with them proactively. Companies that do not invest in this area will ultimately pay the highest price in lost or stolen data and intellectual property, as well as in damaged equipment recovery and decreased employee productivity. SecurityLinx™ is a smart solution that not only minimizes threats; it actually pays for itself many times over. This product takes the sting out of hiring more personnel and purchasing costly hardware. Best of all, it comes with a 100% Satisfaction Guarantee.     What  is  SecurityLinx™?     • A  fully  managed  Universal  Threat  Management   • Archiving  of  emails,  IMs,  and  URLs   (UTM)  Internet  Security  Solution       • Weekly  Reporting   • Hardware  &  Client  VPN  Management   • No  hardware  purchase  required       • Web  Content  Filtering  with  Quotas   • Low  monthly  price  starting  at  $189.95     • Multi-­‐threat  protection     RealLinx deploys a Firewall Hardware Device at your site (in NAT or Bridge mode) and works with your LAN administrator to add a whole new level of security and productivity tools to your network and business. These include: Web  Content  Filtering   IM  Archiving   Hardware  VPN   Anti  Virus  &  Spam   Override  Admins   Email  Archiving   Client  VPN   Anti  Spyware   Custom  Surf  Rules   URL  Archiving   Clientless  VPN   Anti  Malware   Category  Quotas   Weekly  Reports   Port  &  Host  Mapping   Anti  Trojan   IM  Control   On-­‐Demand  Reports   Intrusion  Attacks   Anti  Worm   Application  Control   Customized  Reports   DoS/DDoS  attacks   Failover  Redundancy     Archiving  and  Reporting:    Owners,  Managers,  and  HR  Directors  will  absolutely  love  the  Archiving  and  Reporting.  Do  you  need  to  know   the  content  of  a  specific  email  or  IM  that  a n  employee  sent  or  received?  Do  you  need  to  know  if  a  user  was  surfing  an  unauthorized  site?  Do   you  want  to  know  who  your  “power  users”  are  and  where  your  network  bandwidth  is  going?  It’s  all  included  and  easily  discoverable.           Web-­‐filtering  =  ROI:    All  businesses  face  a  great  challenge.  When  left  unchecked,  employees  will  use  the  Internet  excessively  for  personal   use.  On  average,  employees  spend  20%  of  their  workday  on  non-­‐work-­‐related  surfing.  The  most  common  abuses  are:  social  networking  (such   as  Facebook,  Myspace,  and  Twitter);  streaming  media  (such  as  Youtube,  Podcasts,  and  Webcasts);  banking;  shopping;  online  trading;  and  even   on  gambling,  games,  pornography,  and  numerous  other  common  HR  violations.         SecurityLinx™  dramatically  improves  productivity:    By  shutting  down  or  limiting  access,  employees  cannot  visit  distracting   websites.  Studies  show  that  productivity  goes  up  immediately  when  users  cannot  access  these  sites.  Employees  go  back  to  work!  Simple  math   will  show  that  if  you  gain  back  10%  to  20%  in  employee  productivity,  the  positive  financial  results  are  staggering.  What  could  your  business  do   with  20%  more  employee  productivity?  How  much  money  would  those  numbers  save  for  your  company?     Custom  Web  Filter  Rules  with  Time  Quotas:    We  recognize  that  customization  is  key  in  a  successful  web  filtering  strategy.  We  will   help  you  create  up  to  6  custom  “Groups”  that  have  different  rules  applied.    OWNER,  UPPER  MANAGEMENT,  HR,  MANAGERS,  IT,  and  EMPLOYEE   are  common  groups  types.    Each  of  these  can  have  custom  rules  applied  to  allow  more  latitude  and  freedom  to  the  groups  that  need  it.    Time   quotas  can  also  be  added,  which  allows  you  to  specify  the  amount  of  time  authorized  for  sites  such  as  Facebook.    Want  to  allow  15  minutes  per   day  for  Social  Networking  and  15  minutes  per  day  for  online  banking?    No  problem.    
  • 2. HARDWARE   RealLinx  uses  state-­‐of-­‐the-­‐art  and  industry-­‐leading  hardware  to  ensure  the  best  possible   performance  and  results.  We  are  a  Gold  Partner  with  Fortinet,  a  highly  respected,  industry   leader  in  the  Unified  Threat  Management  (UTM)  field.  RealLinx  uses  a  combination  of  Fortigate   Firewalls,  Fortianalyzer  Reporting  Servers,  and  Fortimanager  for  centralized  management.  Our   techs  and  Engineers  are  trained  and  hold  both  FCNSA  (Fortinet  Certified  Network  Security   Associate)  and  FCNSP  (Fortinet  Certified  Network  Security  Professional)  certifications.     DESIGN   INSTALLATION   Our  Security  Engineer  will  work  with  you  to   SecurityLinx™  hardware  will  ship  to  your  location   customize  SecurityLinx™  to  fit  your  specific  business   pre-­‐configured  for  use  based  on  the  selections   needs.  We  start  with  a  basic  default  template  and   made  in  the  design  phase.  Note  that   let  you  tweak  it  as  much  as  you  like.  Here,  you  can   SecurityLinx™  is  a  “Remote  Installation,”  and   decide  on  limits  and  quotas  for  things  such  as   RealLinx  will  provide  up  to  3  hours  of  free  phone   Facebook  and  YouTube,  or  you  can  eliminate  access     support  while  our  Security  Engineer  works  with   to  them  altogether.  In  this  phase,  we  will  look  at     your  LAN  Administrator,  IT  Pro,  or  Consultant.  In   your  VPN  needs  and  will  even  work  with  other   smaller  offices  and  networks,  it  is  possible  for  our   providers  and  devices  to  interconnect  our  hardware   Engineers  to  work  with  your  non-­‐technical   to  theirs.  You  may  also  choose  between  NAT  or   personnel,  however,  using  an  IT  Pro  is   Bridged  mode.  The  Bridged  mode  lets  your  existing   encouraged.    Note  that  the  same  Security   network  and  VPN  settings  remain  unchanged  while   Engineer  that  designed  your  solution  will  also  be   we  add  in  the  layers  of  Security  you  are  missing.     the  one  that  works  with  you  to  install  it.       TESTING  &  TRAINING   After  installation,  RealLinx  will  perform  a  series  of  tests  to  ensure  that  all  systems  are  functioning  and  that  your   new  Security  Services  are  performing  per  the  initial  design.    After  the  initial  testing,  we  allow  up  to  60  days  of   unlimited  free  tweaks  and  changes  to  make  100%  sure  you  are  fully  satisfied.   The  same  Engineer  that  performed  your  design  and  installation  will  also  walk  you  through  every  step  necessary  to   access  the  amazing  wealth  of  information  stored  in  the  Archiving  Server.    You  will  also  receive  a  comprehensive     guide  that  details  every  step  of  the  training.       SUPPORT   PROACTIVE  REPORTING   24•7•365  Live  phone  support  is  part  of   Every  Monday  (or  whatever  day  you  prefer)  you  will  receive  a  detailed  report  of  what   the  package.    O ur  support  office  is   occurred  on  your  connections  to  the  Internet  during  the  previous  week.    Who  used  the   manned  and  your  system  is  proactively   most  bandwidth?    Who  attempted  to  reach  the  most  blocked  sites?    What  are  the   monitored  for  outages  Monday  –  Friday   most  accessed  sites  by  your  users?    Who  sends  and  receives  the  most  Instant   from  7am  to  7pm  C ST  and  phone   Messages?    Now  you’ll  know  all  of  this  and  so  much  more.   support  is  available  around  the  clock.    If     ARCHIVING   your  unit  fails,  we  will  have  another  one   Want  to  know  what  someone  said  via  IM  10  minutes  ago?    Want  to  see  an  email   to  you  overnight  on  any  non-­‐holiday   exchange  between  an  employee  and  a  client?    Want  to  see  if  an  employee  was  surfing   Monday  –  Friday.  Your  support  package   a  website  that  violates  your  policies?    Simply  log  into  your  portal  and  see  what  is   includes  unlimited  tweaks  and  revisions   happening.    Months  of  data  are  stored  (sizing  based  on  plan  chosen  &  additional  space   for  the  first  60  days  and  one  hour  per   may  be  purchased).    This  tool  is  essential  for  today’s  HR  liabilities  and  can  provide  you   month  of  additions,  moves,  and  changes   with  the  evidence  you  need  to  confirm  your  suspicions  or  to  put  your  mind  at  rest   thereafter.    Additional  changes  can  be   regarding  these  crucial  issues.   made  at  the  low  rate  of  $120  per  hour   (in  quarter  hour  increments).   SATISFACTION  GUARANTEED   One  of  the  m ost  exciting  features  of  SecurityLinx™  is  that  there  is  no  risk  to  try  the  service.  You  have  30  days  from  the   date  of  the  installation  to  evaluate  SecurityLinx™  without  any  concern  of  being  tied  to  a  contract.  If,  at  the  end  of  the   trial  period,  you  are  not  completely  convinced  that  SecurityLinx™  is  worth  every  penny  of  your  investment,  send  the   hardware  back  and  all  charges  (other  than  shipping  and  activation)  will  be  refunded  and  the  contract  nullified.  We  are   convinced  that  you  will  realize  ROI  within  the  first  30  days,  however,  if  we  do  not  meet  your  expectations  FOR  ANY   REASON,  we  will  graciously  refund  the  monthly  service  charges  and  thank  you  for  the  opportunity  to  serve  you.    
  • 3.             Sample  Reports  –  User  Web  &  IM  Traffic:                    
  • 4.             Sample  Reports  –  User  P2P  (Bit  Torrent)  &  Email  Traffic  &  AV  Attacks:                  
  • 5.             Sample  Reports  –  Bandwidth,  Protocol,  Sessions,  and  Archiving: