|
• Home • Rescue Me • Products • Services • IS Confidential Blog • Support • About Us • Press/Media • |
® |
|
• Features • Tech Info • Contact Us • |
® |
The GuardPoint® Internet
Server is primarily a Firewall. A Firewall secures your pathways to the
Internet. Three years in development, the GuardPoint
Firewall is custom configured to allow only your legitimate data to
pass through. The key point to remember about a firewall is that it needs constant updating to handle new security threats as they surface. Too many companies simply purchase firewall hardware and do not invest in keeping the protection up-to-date with software updates and staff training. Let us be a part of your operation and provide the expertise and persistence to give you adequate protection. |
|
• |
||
GuardPoint® is also an Internet mail server
that is able to handle hundreds of Email accounts for your organization.
Or if you have a Microsoft Exchange Server or other messaging system, the
GuardPoint service will securely route each message through the firewall.
We can supply your
organization with your own domain name giving you a prestigious
Myself@MyCompany.com address.
Even GuardPoint's mail delivery is unique. We
filter all your Email through an optional spam and
virus removal service. And, if you should ever have a power failure
or any interruption of your Internet connection, your valuable Email is
kept safely in our network center until you are
ready to connect again. You may have several domain names tied to your Email system. This will let you put various faces on the same backend infrastructure. For example, Info@CCI.Net and info@emailclean.com look different but actually are the same Email account. Recommended is our virus detection service. We use an automated routine that breaks down each incoming message into its components and compares them to our virus database that is kept it updated as new viruses come out. Because some viruses can be invented and distributed faster than cures can be created, we can not guarantee that we will catch every possible virus. Messages with viruses are rejected and the sending and receiving parties are notified. This service also does not stop viruses from being sent from PC to PC within your organization, on floppies, web based Email or downloaded from the web or FTP sites. For this, we recommend anti-virus software be installed on each computer in your organization including Email and data servers. Contact us for a quote on providing, installing and maintaining this software for you. |
||
• |
||
Web Server | GuardPoint® comes with an
industry standard web server for you to host your own WWW site or internal
"Intranet". We can either put a simply web server right on the GuardPoint
box itself or setup a more complex server inside or outside the firewall.
We recommend placement inside the firewall as GuardPoint will pass through all Internet protocols. In addition, GuardPoint service at additional cost "reverse proxy" your web pages at our network center. That means that even if you have a narrow Internet pipe between your company and your ISP, your clients will see your web pages at our main Internet connection speed. |
|
• |
||
WWW and Other Internet Access (Proxy Server) | GuardPoint® serves as a proxy server which means that all your staff can be given access to the Internet including the World Wide Web (WWW) and File Transfer Protocol (FTP). All your staff will share one economical connection. Further, the pages are cached on your GuardPoint® server which increases overall speed as repeated requests for popular pages are served from the cache of your proxy server. | |
• |
||
Internet Protocols Supported | GuardPoint® supports virtually every protocol that a business will need. FTP, HTTP, security and even H.323 video without security problems. In addition, we maintain a library of secure pathways developed for most software programs. These are adapted as needed when your GuardPoint® server is installed. | |
• |
||
Remote Management | Don’t be fooled! Running a professional level Internet access system is time consuming and expensive! We will install the GuardPoint® Internet server with all associated equipment and maintain/replace it as necessary. It is monitored remotely by highly experienced professionals. We encourage our corporate clients to call us for all changes. A simple phone call or Email from designated individuals is all that is necessary. | |
• |
||
Virtual Private Network (VPN) |
VPN is also called "tunneling". It allows your
company to have trusted remote users with simple Internet accounts
"tunnel" through the Internet and into a secure computer behind your
firewall. This can be either a single user or a whole company that is
trusted by your firm. Access privileges are set as needed. Several of our clients use VPN to economically pass data back and forth to overseas branch offices. GuardPoint® is fully compatible with most VPN systems including Guardpoint VPN Appliances, Microsoft®, Shiva/Intel® and Aventail®. Software or hardware based VPN can be designed into your initial installation or added at a later date. |
|
• |
||
Management and Web usage reports | GuardPoint® will Email your site administrator with each days surfing report giving you a convenient method of checking for inappropriate use. Other reports let the Administrator "drill down" to each users web activity and even out to the sites visited. We also can provide you with graphs of your bandwidth utilization. | |
• |
||
Domain Name |
|
• Home • Rescue Me • Products • Services • IS Confidential Blog • Support • About Us • Press/Media • |
Send mail to
info@cci.net
with
questions or comments about this web site. Our Clients are Good Netizens who follow our Acceptable Use Policy Copyright © 2015 CCI.NET |
|
|