The WTC Bridge System

Customized software solutions that give you easy access to all your critical data using The WTC Bridge Solutions.

This advance technology allows for full control of 3rd party system interfaces (like API’s) and data access security from 3rd party system. Looking to build data lakes and or data warehouses, this technology secures the processes and provides enhanced data integrity. Please contact us for more information.

1| CISCO UMBRELLA

  • First line of internet defense wherever users go
  • Cloud Security solution at the Foundation of the Internet
  • Block Malicious Destinations before a connection is made
  • DNS-Layer security and interactive threat intelligence

2| FIREWALL FILTERING

  • GEO filtering for eliminating unwanted traffic from foreign countries
  • Content filtering for websites
  • Internet malware filtering

3| VPN CONNECTIVITY

  • Specific approved connections for application access
  • Specific client connections using additional authentication
  • Remote site connectivity to main location via protected
    tunnel

4| FIREWALL ACCESS RULES

  • Onsite monitoring system with 24/7 alerting
  • Allow access to specific internal applications from the outside

5| PASSWORD AUTHENTICATION POLICY

  • Password Complexity rules
  • 2 Factor Authentication
  • Password Change Frequency

6| PHYSICAL FIREWALL

  • Monitor all traffic on the network
  • Cellular internet backup
  • External connection monitoring

7| ARTIFICIAL INTELLIGENCE SCANNING

  • Constant scanning of the network using advanced analytics not tied to specific patterns

8| VULNERABILITY TESTING

  • External Penetration testing to validate security practices
  • Internal Vulnerability scans on all network devices
  • Internal Vulnerability scans on all installed software
  • Provides detailed actionable priority list

9| SMART CAMERAS

  • Monitor internal areas of your business
  • No control unit needed
  • Advanced traffic analytics
  • Infrared ability

10| SMART SWITCHES AND ACCESS POINTS

  • Monitor ALL traffic across wireless & LAN connections
  • Separate “Guest” wireless networks
  • Segment traffic per switch port for increased security and protection

11| WORKSTATION SUPPORT & UPDATES

  • Remote monitoring of all workstations, servers, and other
    hardware
  • Monthly updates for windows and other patches and firmware
  • Internet malware filtering

12| SERVER AND NETWORK MONITORING

  • Monitor resource utilization for servers and application traffic
  • Monitor Memory, CPU, Disk Space and network bandwidth
  • Email notification when any resources are out of scope

13| SERVER PROTECTION, IMAGING, REPLICATION

  • Server ransomware protection
  • Complete server imaging on local device other than server
  • Complete server image taken every 60 minutes
  • Complete server replication to offsite cloud daily
  • Ability to run environment from the cloud in event of disaster

14| WTC SUPPORT STAFF MONITORING

  • 24/7 monitoring of all systems with automated notifications
  • Highly trained staff at all levels of support
  • immediate escalation within WTC team

Are You Ready?