title = 'Network Security | Computer Network Security | Charlotte TechSupport LLC - NC'; $t->meta_description = 'One of Charlottes most trusted network security companies, Charlotte Techsupport supplies network security support for computers, computer networks, audio and video needs for residents and businesses.'; $t->meta_keywords = 'network security, computer network security, network security support services, network security support, onsite network security, remote network security, 24/7 network security support, charlotte north carolina, nc, huntersville nc, cornelius, mooresville nc, lake norman, lake wylie south carolina, rock hill sc, SC, NC, fort mill, york county, mecklenburg county'; //$t->page_css = 'css/layout.css'; ob_start(); ?>

Network Security Services

Are you safe from bugs, bots and prying eyes?
Is spam still passing for steak to your mail server?

Network security is a prime concern to every business in the digital world. It includes the privacy and integrity of your data, as well as your ability to choose what you receive and what you don't. It bolts your doors to the uninvited and kicks butt in the yard before they get in.

That's what you need. Big, bad, digital guard dogs. On round the clock patrol. We only work with the best. We ensure the highest level of security and privacy. Cyber creeps are cunning and adaptable, but you can be too.
Call us for a free consultation.


Anti-Spam
Is your organization losing valuable productivity wasting time with unsolicited spam? Does your organization ever miss valuable email? AccessEnforcer™ provides an effective and affordable spam prevention and email management solution. You can now reclaim your inbox without losing valuable email whether you host your own email or rely on a third party hosting service. AccessEnforcer provides each individual their very own personal end-user quarantine to filter unwanted email. And our easy to use, intuitive web interface will guide you through the entire process. Even if you don't host your own email server, AccessEnforcer can filter your POP3 traffic for time wasting spam. AccessEnforcer seamlessly integrates with Microsoft's Active Directory to reject illegitimate email, can delete obvious spam and allows both organizations and end users to automatically build approved email lists to ensure you receive all the email you can't afford to lose. AccessEnforcer delivers period summary email for suspicious email at intervals set by the administrator The email summary provides users a one click release feature to expedite deliver of important mail. To safely view highly suspicious email, each user can access his quarantine for a "safe preview" of any email without fear of compromising the security of your network or their computer.

Features Include:

  • SMTP Filtering
  • POP3 Filtering
  • Individual End User Quarantines
  • Quarantine email summaries
  • Quarantine summary scheduling
  • One-click email release from quarantine
  • Personal email address whitelists
  • Global email address whitelists
  • Global email domain whitelists
  • Anti-phishing
  • Real-time URL checking via SURBLs
  • Spam tagging
  • Connection management
  • Strict email recipient checking
  • DNS real-time blacklists (RBLs)
  • Custom DNS real-time blacklists
  • DNS real-time whitelists
  • Spam sensitivity adjustment
  • Sender Policy Framework (SPF)
  • Collaborative hash systems
  • Domain reputation
  • Geographic email policies
  • Web Interface

Anti-Virus
AccessEnforcer™ is the only solution available that deploys DyVax™. DyVax takes a radically different approach to anti-virus filtration - completely eliminating the need for static signatures by utilizing dynamic filtering techniques. Dynamic filtering means no window of vulnerability – new viruses and malicious attacks are prevented before they are even written. Users are secure and businesses can rest easy knowing that viruses will automatically be thwarted. DyVax has successfully blocked zero-day worms and viruses at customer sites, including multiple variants of the Stration Worm, the Storm Trojan, and the Valentine's Day Bug. In laboratory testing, DyVax has proven more successful than the leading commercial and open source antivirus solutions.

DyVax is a proprietary inspection engine that dynamically filters email traffic, Microsft Office files and executable files to identify malicious traffic. DyVax serves as a powerful malware vaccine by proactively shielding the user’s networks, servers, and workstations from malicious threats and offering the industry’s first true and unparalleled, zero-day threat protection. Features include:

  • DyVaxTM signature-less antivirus engine for zero-day threats
  • Deep scanning of executable attachments
  • Deep scanning of Microsoft Office attachments for zero-day exploits

Anti-Spyware
AccessEnforcer™ protects the data on your network from spying eyes by blocking harmful websites and content. Most spyware enters a network via non-work related web downloads or Peer2Peer connections made by employees. Now you can safely and effectively restrict web surfing to strictly business-only content and avoid the costly downtime associated with web browser related cleanups.

Features include:

  • Spyware Blocking via URL Blocking
  • Spyware Blocking via IPS signatures

Web Filter
AccessEnforcer™ provides a web filtering solution that will not only fulfill your business needs, but will also fit your budget. Increase the productivity of your personnel, improve work habits of your team and enhance the performance of your network by reclaiming your bandwidth. When you restrict (or even monitor) where employees surf the web on company time and eliminate non-business applications from your network you will achieve impressive performance improvements across the board. Not to mention that you will stop spyware before it compromises your network and steals valuable bandwidth, generates costly repair bills and destroy employee productivity. AccessEnforcer includes a Web Proxy with extensive features that is designed to give you greater control over web usage in your organization. By blocking harmful websites and content, you are protecting the data on your network from spying eyes. Most spyware enters a network via web downloads. Now you can restrict web surfing to strictly business content and avoid costly downtime associated with web browser related cleanups.

Features include::

  • Monitoring mode
  • Enforcement mode
  • Positive enforcement
  • Negative enforcement
  • URL blacklist categories
  • Custom URL blacklists
  • URL whitelists
  • Restrict web surfing to approved URL whitelist
  • Extension blocking
  • File Type blocking, including ActiveX
  • Spyware blocking
  • Antivirus scanning
  • Content filtering by categories
    (e.g. pornography)
  • Content filtering by keywords
  • Caching for faster downloads

Firewall
AccessEnforcer™ employs a stateful deep-packet inspection firewall to analyze both incoming and outgoing traffic. It examines multiple layers (layers 3-7) of data traffic at a company's gateway for all malicious attacks and blocks even the most insidious attacks (including stealth fragmentation attacks) before they reach the company's internal network. Prevent Denial-of-Service Attacks, Distributed Denial-of-Service Attacks, Spoofing, and Scans at the gateway level.

AccessEnforcer provides the following capabilities:

  • High quality PF firewall
  • Stateful packet inspection
  • SYN Flood DoS protection
  • DDoS protection
  • Anti-Fragmentation
  • ICMP blocking
  • Attack reconnaissance blocking
  • IP whitelisting
  • IP blacklisting

IPS/IDS
AccessEnforcer™ comes complete with a powerful network Intrusion Prevention and Intrusion Detection system - using the same technology currently being utilized by government and military organizations. Backed by the powerful OpenBSD PF firewall and Snort®, the AccessEnforcer IPS/IDS is dedicated to stopping intruders before they compromise your data. Within minutes of installing AccessEnforcer, our customers report stopping attacks their older firewall could not even detect.

  • Snort®, the same IDS/IPS engine used
    by government and military organizations
  • Over 4,000 high-quality signatures
  • IP whitelisting
  • IP blacklisting
  • Dynamic Blacklisting
  • Rule management and exceptions
  • Dynamic blacklisting of offenders
  • Denial of service protection
  • Bot
  • Exploits
  • Malware
  • Adware
  • Downloader
  • Spyware
  • Trojans
  • Cross-site scripting attempts VoIP attacks
  • Extensive Logging of Attacks
  • Rule and Anomaly Based
  • Rule Management and Exceptions

Instant Message Management
AccessEnforcer™ gives you the ability to block all incoming and outgoing Instant Messages on your network. You can block all or one of the following with the click of a checkbox. It's that simple.

  • AIM
  • ICQ
  • Jabber
  • MSN
  • Yahoo
  • Google Talk
  • Internet Relay Chat (IRC)

VPN
It used to take hours to setup a VPN. It was a painful process with many configurations and undocumented protocols, not anymore. AccessEnforcer™ makes setting up a dynamic or static key VPN a breeze. Our extremely easy to use web interface even has a built in VPN wizard to make setup as simple as possible. Why spend hours setting up a secure connection when you can do it in just a minutes?

  • IPSec c
  • Gateway-to-gateway
  • Gateway-to-host
  • AES / 3DES / Blowfish encryption
  • SHA1, SHA256, SHA384, SHA512,
    MD5 authentication
  • Static Keying
  • Automatic Keying (Diffie Hellman
    Exchange)
  • IPS enforcement within VPN tunnels
  • Friendly IPsec wizard
  • PPTP passthrough

Reporting & Logging
What good is the network data you collect if you can't easily view it? AccessEnforcer™ makes viewing this data an easy task. Our easy to use web interface makes it easy to query old network attacks or blocked websites.

Maybe you want to see the past 20 blocked websites, or all of the network alerts with a specific source IP address, and then whitelist that IP. No problem. AccessEnforcer makes this a painless operation. Maybe you want more up to date realtime information like all of the current connections in and out of your network. With a simple click you can view all of this data in real time.

  • Firewall and IPS network alerts
  • Live connection monitoring g
  • Traffic usage graphs
  • Email quarantine reports
  • Web traffic reports
  • Daily administrator PDF reports delivered via email
  • No additional hardware required
  • No additional software required

Internet Defense Force
AccessEnforcer™ is a scalable foundation for the patent pending process that Calyptix Security calls its Internet Defense Force™. The Internet Defense Force leverages the real timedetection and analysis of distributed network data to provide scalable Internet security without signatures.


Network Management
AccessEnforcer™ delivers comprehensive and easy to use comprehensive network management functionality for the small and medium business. .

Network management features include:

  • Friendly web-based interface
  • Static IP Mapping (1:1 NAT)
  • Port forwarding
  • Static routes
  • Static IP addressing
  • DHCP IP addressing
  • IP aliases
  • Individual subnets (LANs)
  • NAT
  • DHCP server for each subnet
  • DNS server for each subnet
  • Fixed MAC-IP address mapping
  • MAC address cloning/spoofing
  • Secure HTTPS remote management
  • Automatic maintenance-free updates
  • Diagnostic tools
  • Highly secure OpenBSD platform