Unfortunately, security breaches and reports of theft of personal data are a common occurrence in the news media.

Local breaches are often kept under the radar and do not become common knowledge. However recent overseas recent security breaches include:

  • "The U.S. Postal Service (USPS) revealed Monday (Nov 10, 2014) that data on its employees may have been compromised in a "cyber intrusion incident." USPS said it recently learned of a data breach affecting the names, dates of birth, Social Security numbers, addresses, employment dates and emergency contact information of up to 800,000 employees."
  • May 5th 2014, CEO resigns after Target spends US$61 million in 2 months responding to a serious security breach involving the theft of 40 million credit cards and personal information of 70 million individuals (Dec 2013- Feb 2014.
  • 2014 EBay faces class action suit over data breach that included personal details of 145 million users
  • A US health care provider was attacked and data including confidential medical information was compromised. 405,000 patients and employees were affected.
  • 2014, 56 million Home Depot credit card breach.
  • Other attacks alleged include theft of nuclear power plant designs.

Traditional network security firewalls based on stateful inspection technologies are unable to adequately address today's security concerns. These legacy firewalls only operate based on information on the start and end of data transmission – the security appliance has no insight into what type of data is being transmitted into your network. They cannot distinguish between permitted and forbidden uses of legitimate applications, nor can they identify and block viruses, worms and malware. To combat today's increased security risk, Next Generation firewalls are used for their ability to identify and classify the traffic that passes through it. By being able to distinguish what the traffic is, firewall rules can then be used to correctly manage it – stopping viruses entering the organisation and only permitting allowed applications to transmit and receive data.

Likened to biological viruses, pathogens and cell mutations, security threats are constantly evolving seeking new avenues for growth. Nature's biological evolution is by accident, whereas digital threats are typically funded programs of organised crime. In nature mutation occurs and it may or may not cause a cancerous growth, whereas in the digital world, evolution of malware is the result of focused probing for weaknesses. Therefore we need to constantly be reassessing security: a modern security programme is not about a set and forget process. Advantage has considered the above and many other factors while researching security products and we are proud to have selected Dell SonicWALL as a major component of our security portfolio. Their high-performance network security solutions are second to none in helping you protect your business in eliminating security gaps and managing your network all the while enhancing productivity.

Next-Generation Firewall.

Includes Reassembly-Free Deep Packet Inspection™ to deliver intrusion prevention, malware protection, application intelligence, control and visualization, and inspection for SSL encrypted sessions. They scan every byte of every packet for the deepest level of protection and massively scale to extend state-of-the-art security to growing and distributed enterprise networks.

Application Intelligence, Control and Visualization.

Dell SonicWALL Application Intelligence and Control provides granular control and real-time visualization of applications to guarantee bandwidth prioritization, prevent data leakage, and deliver more precise control over network traffic.

Deep Packet Inspection firewall.

Dell SonicWALL Reassembly-Free Deep Packet Inspection® technology scans against multiple application types and protocols to protect against internal and external threats at both the application layer and the network layer.

Secure network optimization.

Stay ahead of today's constantly evolving landscape of threats and application-related issues with an advanced security platform that consolidates Dell SonicWALL Next-Generation Firewall features for enterprises along with WAN acceleration for distributed offices to maximize security and control with minimum network latency.

Application Traffic Analytics

The Dell SonicWALL Application Traffic Analytics solution provides organizations with powerful insight into application traffic, bandwidth utilization and security threats while providing enhanced troubleshooting and forensics capabilities. Businesses can easily identify non-business applications consuming network resources to modify usage policies accordingly.

Deep Packet Inspection for SSL encrypted traffic (DPI-SSL).

DPI-SSL transparently decrypts, inspects and re-encrypts SSL encrypted traffic to allow security services to be applied to all traffic that traverses Dell SonicWALL Next-Generation Firewalls.

Secure wireless controller.

Dell SonicWALL firewalls can be extended with secure wireless access points, SonicPoints, to provide seamless and secure 802.11 a/b/g/n wireless networks protected with the Dell SonicWALL Clean Wireless technology.

Intuitive management.

Powerful set-up wizards make it easy to quickly set up VPN Tunnels, policies and network rules, which can then be fine-tuned through an intuitive Web interface. All application and signature updates are obtained automatically by the firewall and are effective immediately without reboots or downtime.

Powerful reporting.

Historical reporting on user activity is available through Dell SonicWALL Analyzer software and real-time application analysis through powerful visualization tools.

Business continuity.

Your network will continue to operate without interruption even if there is a hardware or software failure with Active/Passive failover. Stateful synchronization across the appliances enables failover without interruption to existing network traffic and VPN tunnels.

3G/4G Failover

By leveraging recent advances in 3G/4G wireless broadband technologies, Dell SonicWALL firewall appliances enable organizations to use the Internet even in locations where wired broadband access is unavailable or requires time-consuming installation and provisioning.

Centralized policy management

The Dell SonicWALL Global Management System (GMS®) provides flexible, powerful and intuitive tools to manage configurations, view real-time monitoring metrics and integrate policy and compliance reporting, all from a central location. Learn more

Talk to the Advantage team today if you would like to discuss the security of your network and what you can do to protect it and your business.

CoalaWeb Contact

Request more information

Please prove you are human!

Free IT Whitepaper

whitepaper red large

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download!   Need A Consultation?