High availability firewalls to ensure 100 percent uptime and Internet protection.
Intrusion detection and response to monitor for suspicious network activity and prevent both attacks and misuse.
Regular vulnerability scanning to keep critical Internet perimeters secure.
Site-to-site or Virtual Private Network (VPN) capabilities to secure the integrity of information transmitted over public networks.
Strong authentication to positively identify users before granting access to critical information resources.
Virus, vandal and Web site filtering to block malicious data and control site access over the Internet.