About
News
Managed Services
Security
Software Development
Cloud Services
Contact
About
News
Managed Services
Security
Software Development
Cloud Services
Contact
The WTC Bridge System
Customized software solutions that give you easy access to all your critical data using The WTC Bridge System.
Download Brochure
More information coming soon as we add to our website. Please contact us for more details.
1| CISCO UMBRELLA
First line of internet defense wherever users go
Cloud Security solution at the Foundation of the Internet
Block Malicious Destinations before a connection is made
DNS-Layer security and interactive threat intelligence
2| FIREWALL FILTERING
GEO filtering for eliminating unwanted traffic from foreign countries
Content filtering for websites
Internet malware filtering
3| VPN CONNECTIVITY
Specific approved connections for application access
Specific client connections using additional authentication
Remote site connectivity to main location via protected
tunnel
4| FIREWALL ACCESS RULES
Onsite monitoring system with 24/7 alerting
Allow access to specific internal applications from the outside
5| PASSWORD AUTHENTICATION POLICY
Password Complexity rules
2 Factor Authentication
Password Change Frequency
6| PHYSICAL FIREWALL
Monitor all traffic on the network
Cellular internet backup
External connection monitoring
7| ARTIFICIAL INTELLIGENCE SCANNING
Constant scanning of the network using advanced analytics not tied to specific patterns
8| VULNERABILITY TESTING
External Penetration testing to validate security practices
Internal Vulnerability scans on all network devices
Internal Vulnerability scans on all installed software
Provides detailed actionable priority list
9| SMART CAMERAS
Monitor internal areas of your business
No control unit needed
Advanced traffic analytics
Infrared ability
10| SMART SWITCHES AND ACCESS POINTS
Monitor ALL traffic across wireless & LAN connections
Separate “Guest” wireless networks
Segment traffic per switch port for increased security and protection
11| WORKSTATION SUPPORT & UPDATES
Remote monitoring of all workstations, servers, and other
hardware
Monthly updates for windows and other patches and firmware
Internet malware filtering
12| SERVER AND NETWORK MONITORING
Monitor resource utilization for servers and application traffic
Monitor Memory, CPU, Disk Space and network bandwidth
Email notification when any resources are out of scope
13| SERVER PROTECTION, IMAGING, REPLICATION
Server ransomware protection
Complete server imaging on local device other than server
Complete server image taken every 60 minutes
Complete server replication to offsite cloud daily
Ability to run environment from the cloud in event of disaster
14| WTC SUPPORT STAFF MONITORING
24/7 monitoring of all systems with automated notifications
Highly trained staff at all levels of support
immediate escalation within WTC team
Are You Ready?
Contact Us