MENU

Perimeter Security

Your perimeter is still an important defence

Even with the move to Cloud and Zero Trust networking your perimeter is still an important control to protect your organisation.

We have years of experience supporting and managing firewalls

Our team of experts have been deploying, supporting and managing firewalls for many years.

We can help you to manage your firewall so that you get the most from it and all of the additional functionality it comes with.

We have partnered with Sophos, Palo Alto Networks, and ZX Security to provide a range of solutions depending on your specific demands and can offer you solutions for:

Want to know more?

Read more about these solutions in the section below.

Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more about these solutions and how they can help you.

Request more information3

All solutions logo 01 Solutions + Partners

  • Firewall Security

    Your firewall plays an important part in protecting your environment.

    Your firewall plays an important part in protecting your environment. It establishes a barrier between a trusted internal network and an untrusted external network such as the internet.

    We have partnered with the best suppliers to bring the very best firewall security solutions to you.

    Jump to:

    Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more about our firewall security solutions.

    Request more information3   Request a demo

    Sophos Logo

    Sophos XG

    The Sophos XG Firewall provides effective visibility, protection, all from a simple to use console allowing you to quickly respond to threats and gain visibility.

    The XG is managed from the Sophos Central cloud console and is used by many clients in New Zealand.

    • Expose hidden risks
    • Block unknown threats
    • Automatically respond to incidents

    Click here to read more about Sophos XG Firewall

    Back to Top

    Divider3

    Sophos UTM

    Sophos is a Leader in the Gartner Magic Quadrant for Unified Threat Management.

    From a single solution you can have full perimeter security including:

    • Network protection
    • Wireless protection
    • Web protection
    • Sandstorm sandboxing
    • Email protection
    • Web server protection

    Click here to read more about Sophos Unified Threat Management (UTM)

    Back to Top

    Divider3

    palo alto networks logo2

    Palo Alto Networks empowers you to stay ahead of new emerging threats, see and secure your entire enterprise, and support speed and error reduction with automatic policy recommendations.

    Palo Alto offers a firewall that has machine learning and analytics at its core. It is capable of proactively identifying new threats, devices, and more without relying on fingerprinting or signatures.

    Continuously update the machine learning models by analysing data using unlimited cloud compute.
    Continuously collect telemetry and recommend policy and configuration changes to reduce risk and reduce chances of error.

    Highlights

    • Complete security for IoT devices.
    • Prevent unknown threats with inline machine learning.
    • ML-Powered Next-Generation Firewall for Kubernetes.
    • Full visibility into encrypted traffic.
    • Real-time signature streaming.
    • Fastest Next-Generation Firewall.
    • Automated device quarantine for stronger security.
    • UI and API support for SNORT and Suricata signatures.
    • Simplified security that scales with your environment.
    • Flexible monitoring for SaaS applications. 

    Back to Top

  • Wireless Security

    We have partnered with Sophos to provide you with cutting-edge wireless security solutions.

    We have partnered with Sophos to provide you with cutting-edge wireless security solutions. In this section we provide information on two products: Sophos Wireless and Sophos SD-RED Remote Ethernet Devices. Sophos helps you streamline your processes through their Sophos Central Platform where you can manage all your Sophos products from a single interface.

    Learn more about Sophos Central here: https://www.sophos.com/en-us/products/sophos-central.aspx

    Jump to:

    Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more about our how Sophos can help you with wireless security.

    Request more information3   Request a demo

    Sophos Wireless

    Sophos Wireless is easy to deploy and manage, so your wireless networks are up and running in no time.

    Threat Discovery

    Threat on and to your Wi-Fi networks are instantly classified, for example as rogue APs, spoofing attempts, or unknown devices.

    Modular Management System

    Manage Wireless on its own or alongside all of your Sophos Central-managed security solutions.

    Synchronised Security: Intelligence - Connected

    Sophos Wireless combines the power of the Sophos Central platform and their unique Security Heartbeat™ functionality. It monitors and acts upon the health status of connected endpoint and mobile clients to reduce the risk to your trusted Wi-Fi networks.

    • Integrates with your Sophos Endpoint and/or Sophos Mobile when managed in Sophos Central.
    • Provides superior visibility to discover threats at the earliest possible moment.
    • Prevents lateral movement by automatically restricting web access for unhealthy clients.

    *Available with APX only

    Simple Deployment

    Deploying access points is easy with three simple steps to create your networks, register your access points, and set up one or more sites.

    Central Management

    Sophos Wireless is easy to set up and deploy as part of your Sophos Central portfolio of cloud-managed security solutions.

    Built for Performance

    Our APX Series access points are custom-built to offer optimal performance and increased throughput at load.

    Increased Visibility

    With Sophos Wireless you always know the status of your Wi-Fi networks, access points, connecting clients, and the environment around you to identify potential risks or inappropriate use of your resources.

    Hotspots and Guest Access

    You can provide controlled internet access for visitors, contractors, and other guests on your networks.

    With a daily password, or time-based voucher you can customise guest access to display the hotspot portal with your own terms of service.

    Enhanced Rogue AP Detection

    • Identifies and automatically classifies neighbouring Wi-Fi networks according to their threat level.
    • An on-demand scan function shows you the very latest threat data.
    • The Threats widget on the dashboard puts the information directly at your fingertips.

    Wireless Scalability

    Extending your network is as simple as adding an additional access point. Sophos uses the scalability of their cloud-based architecture to the fullest so you can adapt your network to suit your current business needs.

    Click here to download the Sophos Wireless datasheet.

    Sophos Wireless Datasheet for download

     

    Back to Top

    Sophos SD-RED Remote Ethernet Devices

    Sophos SD-RED easily and affordably extends your secure network to other locations.

    • Auto provisioning enables deployment by non-technical staff.
    • Secure VPN tunnel connectivity with your XG Firewall from anywhere.
    • Selective routing options for any mix of VPN and local WAN access.
    • Enterprise encryption.
    • Our SD-RED models fit a variety of remote location and bandwidth needs, and can be enhanced with Wi-Fi or 3G/4G connectivity using optional modules or by adding APX Series access points.

    Plug-and-protect deployment

    It requires no technical skills at the remote site. As soon as it is plugged in and connected to the internet, the Sophos provisioning service automatically connects it to your firewall and establishes a secure, dedicated VPN tunnel.

    Flexible configuration

    Set up your SD-RED devices to tunnel all traffic from the remote location back to the firewall, controlling DHCP and other network elements of the remote network. Or you can choose to only route inter-office network traffic via your SD-RED, while enabling direct internet access from the remote location.

    Securely encrypted, centrally managed

    All data between the SD-RED and your Sophos firewall is encrypted using AES-256 levels. This provides you with a tamper- and hack-proof, secure connection. With central management for the latest XG and SG Series, protection is completely transparent across your distributed network and can be customised or replicated to suit your needs.

    Synchronised SD-WAN

    When managed through XG Firewall, Synchronized SD-WAN allows you to benefit from the power of Synchronized Security and XG Firewall’s integration with Sophos Intercept X to optimize WAN path selection for your important business applications with 100% reliability.

    Flexible Wi-Fi and WAN connectivity

    Optionally add a Wi-Fi-5 or 3G/4G module to provide connectivity for wireless clients or to use 3G/4G internet connections.

    Click here to download the Sophos SD-RED datasheet and technical specifications.

    Sophos SD RED datasheet and technical specifications

     

    Back to Top

  • Penetration Testing

    We have partnered with ZX Security to provide you with digital penetration testing services to supplement our other capabilities.

    We have partnered with ZX Security to provide you with digital penetration testing services to supplement our other capabilities.

    Penetration testing plays an important role in helping you understand application, network and perimeter based vulnerabilities that hackers could exploit. Understanding what these gaps are is the first step towards remediation.

    We have worked with ZX Security on numerous clients and rate them as one of the best Penetration Testing firms in New Zealand. That is why we also use their services on our own perimeter and applications.

    Want to know more?

    Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more or see a demo about any of our email security solutions.

    Button

    Our Process

    • ZX Security uses a structured approach to penetration testing which is based on the Open Source Security Testing Methodology Manual (OSSTM) and the Open Web Application Security Project (OWASP) Testing Guide.

    • At the conclusion of an engagement, you will receive a detailed report identifying security issues. This will include technical recommendations that are operationally focused to assist your staff in remediating the issues found.

    Focus Areas

    Some areas that we can help with, in conjunction with ZX:

    • External penetration tests
    • Internal penetration tests
    • Red team engagements
    • Web / API application penetration tests
    • Mobile application security review
    • Source code review
    • Corporate WiFi penetration tests
    • Host hardening review
    • Radio spectrum hacking
    • Cloud security review