Home of Dark Fiber MAN, Defense In Depth
(DID) andSecurity and Disaster Recovery.
GRC and Lageman.com have merged to form a
multi state enterprise offering Security, systems integration services and Dark Fiber Metropolitan Area Networks. Check our Bandwidth Chart if your curious about what speeds are possible
today using fiber optic networks.
We are a HIRE AMERICA FIRST company.
the Article on the Largest National Security Breach in the history of the US.
"The world isn't run by weapons anymore, or energy,
or money. It's run by ones and zeros--little bits of data--it's all electrons....There's a
war out there, a world war. It's not about who has the most bullets. It's about who
controls the information--what we see and hear, how we work, what we think. It's all about
information." Lines from the character "Cosmos," in the movie Sneakers,
MCA/Universal Pictures, 1992.
The motion picture Sneakers focused on computerized information as a
valuable commodity and on the technological means to invade and steal that commodity. To
many, the high-tech wizardry of the movie probably appears exotic; however, it is much
more realistic than some assume.
Security is a process, not a product. It
touches every aspect of an organization. Yet security is often an afterthought. Even
worse, some organizations' idea of security is the firewall sitting at the network
edge or the virus scanner integrated into the mail servers.
Wrong. Security is none of these things.
Security is an approach to allowing authorized
access to resources. Resources can be a shared disk drive, a Web page, an FTP
site or access to the central computing facility, back end accounting system or the front
end to an E-Commerce site by people both inside the company and outside on the Internet.
It should be obvious that with the wide variety of entry points into your network,
a layered approach to network security is required a Defense In Depth (DID) approach.
Security begins and ends with people. Therefore,
security products and processes need to get pushed as close to the user as possible. That
means building security deeper into the network than is seen today.
Traditional network security takes the perspective of
"What are we trying to protect?" and "Whom are we trying to protect it
from?" If you do your planning, you know that the answers depend on
the value of the data. But those two perspectives say nothing about what kind of
access, and by whom, should be permitted.
Just as there are many elements to security, there are many ways to
solve those issues. Network security is about using the right tool for the right job and
applying defense in depth. A firewall is great to control network access, but very few
reach up into the application area. Likewise, it is well known that hardening your
perimeter keeps intruders out, but you're still vulnerable to inside attacks. Security
controls should be applied based on what is needed to protect resources rather than on
network topography. Greenriver Communications belives that a
complete approach to security is a proper approach. Whether you are a small
office or SOHO or a fortune 1000, we can provide you with Secure Business
Solutions for Today's Challenges.