The WTC Bridge System

Customized software solutions that give you easy access to all your critical data using The WTC Bridge System.

Bridge_no red

More information coming soon as we add to our website.  Please contact us for more details.

cloud-01

1| CISCO UMBRELLA

  • First line of internet defense wherever users go
  • Cloud Security solution at the Foundation of the Internet
  • Block Malicious Destinations before a connection is made
  • DNS-Layer security and interactive threat intelligence
moat-01

2| FIREWALL FILTERING

  • GEO filtering for eliminating unwanted traffic from foreign countries
  • Content filtering for websites
  • Internet malware filtering
gatewaay-01

3| VPN CONNECTIVITY

  • Specific approved connections for application access
  • Specific client connections using additional authentication
  • Remote site connectivity to main location via protected
    tunnel
drawbridge-01

4| FIREWALL ACCESS RULES

  • Onsite monitoring system with 24/7 alerting
  • Allow access to specific internal applications from the outside
pathway-01

5| PASSWORD AUTHENTICATION POLICY

  • Password Complexity rules
  • 2 Factor Authentication
  • Password Change Frequency
outer walls-01

6| PHYSICAL FIREWALL

  • Monitor all traffic on the network
  • Cellular internet backup
  • External connection monitoring
ourt open areas-01

7| ARTIFICIAL INTELLIGENCE SCANNING

  • Constant scanning of the network using advanced analytics not tied to specific patterns
sentry-01

8| VULNERABILITY TESTING

  • External Penetration testing to validate security practices
  • Internal Vulnerability scans on all network devices
  • Internal Vulnerability scans on all installed software
  • Provides detailed actionable priority list
guard towers-01

9| SMART CAMERAS

  • Monitor internal areas of your business
  • No control unit needed
  • Advanced traffic analytics
  • Infrared ability
inner walls-01

10| SMART SWITCHES AND ACCESS POINTS

  • Monitor ALL traffic across wireless & LAN connections
  • Separate “Guest” wireless networks
  • Segment traffic per switch port for increased security and protection
INNER OPEN AREAS-01

11| WORKSTATION SUPPORT & UPDATES

  • Remote monitoring of all workstations, servers, and other
    hardware
  • Monthly updates for windows and other patches and firmware
  • Internet malware filtering
keep walls 2-01

12| SERVER AND NETWORK MONITORING

  • Monitor resource utilization for servers and application traffic
  • Monitor Memory, CPU, Disk Space and network bandwidth
  • Email notification when any resources are out of scope
keep vault-01

13| SERVER PROTECTION, IMAGING, REPLICATION

  • Server ransomware protection
  • Complete server imaging on local device other than server
  • Complete server image taken every 60 minutes
  • Complete server replication to offsite cloud daily
  • Ability to run environment from the cloud in event of disaster
knights-01

14| WTC SUPPORT STAFF MONITORING

  • 24/7 monitoring of all systems with automated notifications
  • Highly trained staff at all levels of support
  • immediate escalation within WTC team

Are You Ready?