The WTC Security System

Make your business castle a secure fortress with The WTC Security System.

Our 14 layers of security help to protect your most valuable asset from digital invasion and corruption.

1| SECURE UMBRELLA

  • First line of internet defense wherever users go
  • Cloud Security solution at the Foundation of the Internet
  • Block Malicious Destinations before a connection is made
  • DNS-Layer security and interactive threat intelligence
  • Portal Managed

2| FIREWALL FILTERING

  • GEO filtering for eliminating unwanted traffic from foreign countries
  • Content filtering for websites
  • Internet malware filtering
  • Portal Managed

3| VPN CONNECTIVITY

  • Specific approved connections for application access
  • Specific client connections using additional authentication
  • Remote site connectivity to main location via protected
    tunnel
  • Portal Managed

4| FIREWALL ACCESS RULES

  • Allow only approved traffic from approved IP adresses
  • Allow access to specific internal applications from the outside

5| PASSWORD AUTHENTICATION POLICY

  • Password Complexity rules
  • 2 Factor Authentication
  • Password Change Frequency

6| PHYSICAL FIREWALL

  • Monitor and record all traffic on the network
  • Cellular internet backup
  • External connection monitoring

7| ARTIFICIAL INTELLIGENCE SCANNING

  • Constant scanning of the network using advanced analytics not tied to specific patterns

8| VULNERABILITY TESTING

  • External Penetration testing to validate security practices
  • Internal Vulnerability scans on all network devices
  • Internal Vulnerability scans on all installed software
  • Provides detailed actionable priority list

9| SMART CAMERAS

  • Monitor internal areas of your business
  • No control unit needed
  • Advanced traffic analytics
  • Infrared ability

10| SMART SWITCHES AND ACCESS POINTS

  • Monitor ALL traffic across wireless & LAN connections
  • Separate “Guest” wireless networks
  • Segment traffic per switch port for increased security and protection

11| WORKSTATION SUPPORT & UPDATES

  • Remote monitoring of all workstations, servers, and other
    hardware
  • Monthly updates for windows and other patches and firmware
  • Internet malware filtering

12| SERVER AND NETWORK MONITORING

  • Monitor resource utilization for servers and application traffic
  • Monitor Memory, CPU, Disk Space and network bandwidth
  • Email notification when any resources are out of scope

13| SERVER PROTECTION, IMAGING, REPLICATION

  • Server ransomware protection
  • Complete server imaging on local device other than server
  • Complete server image taken every 60 minutes
  • Complete server replication to offsite cloud daily
  • Ability to run environment from the cloud in event of disaster

14| WTC SUPPORT STAFF MONITORING

  • 24/7 monitoring of all systems with automated notifications
  • Highly trained staff at all levels of support
  • immediate escalation within WTC team
  • Professional User Security Training
  • Fully automated simulated phishing, vishing & smishing attacks

Are You Ready?

We see you want more information!

We will be happy to email you our brochure.