Clicky

Altaware, Inc. | Vendor Technologies

Altaware Vendors Listed by Technology

Use the boxes below to select how to filter the list.
@defend,@detect,@manage,@recover
Use a filter from above to show even less results.
@defend
@defend - The ability to “defend” is more of the classical cyber security toolset. Use these kind of solutions to block attacks and prevent them from gaining a foothold. This is very important as it’s typically the earliest chance you’ll have in a kill chain to prevent a successful breach. These kind of solutions are best when used in multiple layers (e.g. firewall, endpoint, etc.) to achieve defense in depth. Please note, most defend techniques won’t block already entrenched malware unless it can detect “phone home” kind of activity of a botnet to a central command and control server.

Listed below are some vendor solutions we offer that may address this concern.
@detect
@detect - The ability to “detect” is extremely important to reduce the “dwell time” or the amount of time before a breach is detected. Considering the industry average is over 200 days, there is a lot of improvement and benefits that can be achieved by adding or increasing the tools to detect an already entrenched threat or attempt at data exfiltration. Detect technologies are an excellent compliment to cyber security and offer a good ROI compared to just defend tools. Detection gives necessary visibility into the effectiveness of your cyber security defense.

Listed below are some vendor solutions we offer that may address this concern.
@manage
@manage - If you can’t effectively manage or operate what you have, you’re going to ignore it and not keep it current. That defeats the effectiveness of your cyber security and network management solutions.

Listed below are some vendor solutions we offer that may address this concern.
@recover
@recover - After a breach, it comes down to your ability to effectively respond and in some cases recover. The likelihood of needing to recover from a breach increases when any of these items apply:
- No decryption is used (that means 30-40% of the traffics is NOT inspected)
- Users are allowed to use personal email, chat, file sharing and social applications
- Users have laptops or mobile devices that are not protected when they are “off the ranch”
- Wireless isn’t policed or protected well
- No NAC solution is in place
- Poor credential management or authentication

CryptoLocker and other forms of ransomeware can be devastating. Having backup copies and point in time copies on and offsite are a necessary part of the recovery process. Just as important is that the other copies not be directly accessible online (as in mounted) or accessible with the same credentials.

Relying purely on cyber defense without having plans in place for response and recovery is reckless.

Listed below are some vendor solutions we offer that will help address this concern.
All,@defend,@detect,@manage,@recover,Backup,BYOD,Cisco,Cloud Security,DNS/DHCP,Email Security,Endpoint,File Security, Firewalls,IPS,Link Balancer,Multi-factor,NAC,Network Management,Remote Access,Routers,Security Review,SIEM,Switches,Taps,VPN Client,Web Security,Wireless
Click below to select a vendor
Email Security
We offer high end solutions and professional expertise to provide extensive Email security solutions. We have the skills to mix, match and layer solutions to offer the right level of protection for mid-market to enterprise customers.

Fortinet offers high end on-premise or cloud solutions that include sandbox capabilities. Fortinet includes SPAM and AV protections all in one appliance that integrates with sandbox protection.

Barracuda offers an anti-SPAM and AV Email protection solution.
Firewalls
We know our firewall solutions… We have numerous years of experience with next generation firewalls and can configure, install, tune and audit configurations. We’ve run several side by side and intimately know their strengths and weaknesses. That means we can find and cater a solution to meet your needs. When it comes to validated 3rd party performance/security tests and ease of use, we highly recommend Palo Alto Networks and Fortinet depending on your specific needs.
NAC
There is no single ideal solution that fits everyone, but it does depend heavily on some choices:
- Active/Passive (control and/or visibility)
- Guests and/or employees (students too)
- Wired/wireless
- Along with scale (hundreds or tens of thousands)

We are NAC specialists and we know that NAC means different things to different people. Whether it’s network admission control, access control, visibility within networks (wired or wireless), guest networks, self registration, strict endpoint compliance or you name it.

It’s best to contact us direct to understand NAC choices, but to summarize:
- ForeScout works in a lot of environments for multiple use cases in small to massive scales
- PulseSecure is good for 802.1x and existing PulseConnect (previously Juniper SSL VPN) customers
- Fortinet isn’t really NAC per se, but can be used to enforce client settings and FortiClient installs when using FortiGate firewalls
Remote Access
We have more remote access solutions than listed, but it comes down to three choices:
- Included offerings in firewalls
- Enterprise class solutions for most any device from most anywhere with access controls
- IPsec endpoint solutions

PulseSecure is a best in class market leading and excellent cross-platform solution. Barracuda has an SSL VPN appliance. Call us to understand the choices and tradeoffs.
Email Security,Web Security,Backup,Remote Access,Firewalls,Link Balancer,@defend,@detect,@recover,All
@defend,@detect,BYOD,Email Security,Endpoint,Firewalls,IPS,Link Balancer,Multi-factor,NAC,SIEM,Switches,Wireless,All
Web Security,File Security,@defend,@detect,All
Cloud Security,Endpoint,Firewalls,IPS,@defend,@detect,All
@manage,@detect,File Security,Security Review,All
NAC

© 2017 Altaware, Inc. | All rights reserved.

866-833-4070

CYBER SECURITY | ORANGE COUNTY, CA