Firewall Management
What firewall and network services are on offer through Data Connect?
We offer end to end cyber security services, which are delivered to you by our team of network and security specialists. Some of the services include:
- Firewall Management
- Cloud Network and Security Design
- Secure Network Design
- Network Segmentation
- Health Checks
Why should I choose to work with Data Connect?
At Data Connect, we have an experienced security team that are also network specialists to help aid you with any challenges related to firewalls and network infrastructure. This allows us to offer a comprehensive suite of services that can either be a point in time project or the start of a long-term partnership. Cyber security is our core focus, which means we can provide you with not just optimal network performance but with security assurance.
Cyber Essentials
What are the differences between Cyber Essentials and Cyber Essentials Plus?
Very briefly there are two flavours of the certification you may be aware of, Cyber Essentials and Cyber Essentials Plus. The requirements for both are the same. Cyber Essentials can be self assessed by filling in a questionnaire and Cyber Essentials Plus is a 3rd party audit by a certification body such as Data Connect. A Cyber Essentials Plus auditor runs various tools to to ratify some of the controls and attestations within the submitted Cyber Essentials questionnaire.
Where can I find the Cyber Essentials Questionnaire?
You will be able to access this through the vSOC Connect Console and also the IASME website.
Are bring your own devices (BYOD) included in the Cyber Essentials scope?
BYOD are in scope unless they are only used for voice calls, text message or MFA apps. Unfortunately, there has always been some misconception around this. To clarify, if a BYOD device accesses any organisational data or service, it is in scope.
Is Cyber Essentials internationally recognised?
Yes, we see a lot of international organisations currently achieving Cyber Essentials.
Vulnerability Management
What is important for a vulnerability management tool to have?
An effective tool really needs to be twofold, it needs to have a huge database of all known vulnerabilities that is updated regularly. It also needs to have the all important coverage, in terms of the types of systems it can assess.