9570e2740a26a77ff15a8efa39330b51.jpg
dacfc9195f42a6d19c8bdb31e98a0fd9.jpg
15d6fd385c13b0dab4ce4eead0ff722a.jpg
7f9cd12fb6b4161da6a985decc4f329a.jpg
1234

SST COMPUTING, INC.

Network Consulting, LAN WAN VOIP and WEB

verticaldiamondpartner
 
 

Firewalls


sonicwall
Who Needs Firewall Protection?

Everyone.


Without the protection of a firewall, which serves as a buffer between an organization's internal network and myriad external networks-including the Internet-any network is vulnerable to threat or misuse by a multitude of entities.

Overview

If your company uses the Internet, chances are that you need a firewall. Fast becoming the most popular form of electronic communication, the Internet brings the entire world to your door. Information security experts suggest that you invest in some method of network security, so you can make sure that it is opportunity knocking at that door, and not a cyber criminal in disguise.

What is Firewall Protection?

A firewall is the most important line of defense between a company's network and the outside world. It serves as a buffer between an organization's internal network (Intranet) and external networks (Internet). Just as Internet use by businesses has escalated sharply in recent years, so too has the occurrence of network security breaches. Firewalls can provide protection for classified information by using different types of application proxies, which are designed to check every connection that crosses the firewall. Many firewall appliances also offer email filtering, web site filtering, security scanning services, and real-time alerting when a breach is attempted.

Who's Behind the Attack?

What threatens the security of a computer network? And who is most at risk? Without the protection of a firewall, any network is vulnerable to threat or misuse by outside entities. These intruders range from cyber vandals-often computer-savvy youth intent on causing mischief-to cyber criminals who illegally penetrate systems with the express purpose of damaging those systems or obtaining resources. Overall, you should be aware of possible attacks from anyone with the capability, technology, opportunity and intent to do harm. Profiles may include terrorists, insiders, disgruntled employees and hackers.

What's the Solution?

SST Computing realized this threat long ago and we have continually worked to develop solutions to protect the networks of our customers using SonicWall, 3com and Pix and other major firewall products.

SST Computing, Inc.

Ph: 770-426-0051
Fax: 770-426-8183

 

Who We Are

SST Computing, Inc., serves as the local MIS for companies with central offices in Western Europe, Australia, and Canada.

We maintain corporate offices in Kennesaw, Georgia a suburb of Atlanta, with in-house backup systems, diagnostic tools, and an extensive parts and systems inventory. 

SST also runs and maintains a number of servers running Microsoft and Linux platforms at this site.