Archive for ‘Meraki’

SECURING YOUR BUSINESS: PART TWO

October 1, 2015
0
Ashley McDaniel

The SolutionCisco Meraki MX Security Appliance

(And how it does more than just securing your information)

Cisco Meraki MX Unified Threat Management provides the full range of data security protection including firewall, intrusion prevention, anti-virus and anti-phishing, content filtering, safe-search enforcement, malware protection, IPsec VPN connectivity, and more. Plus all of this is included for one cost in a single and simple to understand advanced security license.

Meraki MX will automatically detect and classify the devices attached to your network including notebook computers, iPads, iPhones, and Android devices. You can easily set policies to control access by these devices such as making sure they don’t introduce viruses or vulnerabilities to your network.

Internet content filtering assures that you’re in charge of your company’s Internet resources. You can restrict or report on inappropriate use. A simple interface lets you set rules for the entire network, groups or individual users as you see fit.

Meraki MX lets your provide your customers or guest access to the Internet over your wireless network while keeping them safely segregated from your systems. You can limit how much bandwidth access you give guest machines as well as prevent them from accessing objectionable websites.

Maintaining and managing competing systems to the Meraki MX brings to mind words like difficult, complex, or highly technical. Take one look at Meraki’s cloud based management dashboard and you’ll think of words like simple, intuitive, or instinctive.

Contact Broadtek today to learn how you can enjoy the peace of mind that Cisco Meraki security brings to your organization.


MIKE BUCHANAN

Read More
Cisco, Meraki,

SECURING YOUR BUSINESS: PART ONE

September 30, 2015
0
Ashley McDaniel

The Problem Securing your business and personal information

(And why it’s a bigger problem than you make think)

One of the most prevalent and malicious threats to your information is non-targeted malware. The breadth of these attacks is staggering. Symantec reports there were more than 317 million new pieces of malware created last year, meaning nearly one million new threats were released into the wild each day. Simply opening an email and clicking what appears to be a legitimate link may infect your systems with malware. Malware attacks may hijack your system for spammers without your knowledge, steal your customer information, and obtain passwords and account information.

While most malware and viruses are not targeted to any specific organization or business, targeted attacks use a range of tools and exploits to hit a specific organization. You may think these targeted attacks are aimed only at very large organizations, particularly when one of these makes the national news. However, fully 60% of targeted attacks last year struck small and medium sized organizations.

Today you have to look beyond your computer as well. With Internet and/or wireless connected devices such as Smartphones, tablets and iPads, printers, credit card readers, etc., it takes more than a simple PC based anti-virus to protect and secure your valuable information.


MIKE BUCHANAN

Read More