Securing business data
Call us today on 020 7592 8800

Secure Perimeter

CNS have successfully designed, configured and deployed a large number of security solutions very often comprising a mix of firewalls, intrusion detection/prevention systems (IDS/IPS), application proxies, virtual private network (VPNs) and other internet security appliances.  

_____________________________________________________________________________________

Deploying an appropriate perimeter defence model allows companies to gain the required level of real time insight to network activity and apply the right level of security controls. Insight and control can reduce risk to critical back-end systems and corporate assets. The CNS Solutions Team believe in defence in depth putting emphasis on using specialist security skills to deploy the most effective defence technologies supported by appropriate levels of policy, process and procedure. CNS offers the following core services:  

  • Design, technology selection, device configuration, tactical deployment & technical integration, testing, full system handover and documentation
  • Corporate security policy including supporting policies and procedures
  • Technology and/or subject matter training and user education
_____________________________________________________________________________________

Perimeter Firewalls

Perimeter firewalls are the first line of defence – tasked with filtering internet sourced traffic destined for the corporate or private estate. Through strategic alliances with leading firewall vendors, the CNS Solutions Team is able to offer a varied range of perimeter firewall platforms and solutions including static packet filters, stateful firewalls and proxies.

_____________________________________________________________________________________

Web Application Firewalls

Web Application Firewalls (WAF's) protect our clients’ web sites and the web applications and web services on those sites from malicious attacks. Through smart and effective deployment of WAF CNS clients are able to increase the performance and scalability of their web apps whilst providing protection against the OWASP (Open Web Application Security Project) top ten threats and compliance to industry standards such as PCI DSS compliance obligations.

_____________________________________________________________________________________

Intrusion Protection/ Detection Systems

IDS helps to detect inappropriate, incorrect or anomalous activity that could be harmful to a business; whether through data compromise, service availability or reputation.  IDS is typically deployed within the security perimeter or extended outside of the perimeter to provide real time insight to potential threats against the corporate environment. IPS goes one step further and actively prevents network intrusion and potential attacks. The ability of IPS to prevent such occurrences helps to provide the all-important control.

_____________________________________________________________________________________

Next Generation Firewall  (NGF)

NGF is the evolution of the traditional firewall into an all-inclusive security product that has the ability to perform multiple security functions in one single appliance. By utilising our existing services and experience, CNS are able to deploy NGF systems that offer:

  •  Network firewalling
  • Network intrusion prevention
  • Gateway antivirus/anti-spam/anti-malware
  • Email Protection
  • VPN
  • URL filtering 
  • Data leak prevention
  • On-appliance reporting.
  • Application layer inspection
  • Web application protection and reporting
Cambs Police

Cambridgeshire Constabulary we're in need of a team of experts to design and build a CONFIDENTIAL network for PND compliance. We didn't know when we started it would be the 1st of it's kind in the UK.
Read More
Mitsui Bussan Logo

We cannot recommend CNS highly enough for providing us with technically competent and innovative solutions.
Read More
CLAS

CESG Listed Advisor Scheme

CNS employ a number of CLAS Consultants who are integral to the working practices of Hut3 and Mosaic.

www.cesg.gov.uk