SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
SECURITY SOLUTIONS




 SECURITY
WHY PAETEC SECURITY SOLUTIONS?
Network security is a fundamental requirement for all
businesses in today’s environment. The growing number
and complexity of security threats requires a highly skilled
team of security professionals seamlessly integrated with
a layered defense plan to protect against hackers, malware,
and other threats in the virtual world. PAETEC’s Security
Solutions offer assurance that your business is getting the
most bang for your broadband buck—all from one provider,
on one bill, with one hand to shake.

PAETEC’s Security professionals can provide personalized
solutions based upon your business’ specific security needs.
Whether you wish to utilize a network-based hosted security
solution for scalability, meet with our Security Engineers
who carry industry-leading certifications to discuss
compliance, or build a complete layered security solution
for your entire network, PAETEC can rise to the challenge.

Productivity and Efficiency – Ensure that malicious
content isn’t stealing your company’s valuable bandwidth
and slowing your network services and employee
productivity to a crawl. With PAETEC’s Security Solutions,
you can unburden your IT staff from daily security tasks
by letting PAETEC manage your security infrastructure.

Peace of Mind – Leverage PAETEC’s Security professionals,
who carry industry-leading certifications, including
SANS, GIAC, and CISSP, as well as thousands of hours of
experience protecting, troubleshooting, and remediating
security issues across hundreds of customer networks.

Cost-Efficiency – Enjoy PAETEC’s unique position as
a Telecommunications Provider and as a Managed
Security Service Provider (MSSP), which presents
phenomenal opportunities for cost-savings through
the use of such scalable solutions as our line of Hosted
Security services that, on average, provide 65% savings
compared to LAN appliance-based solutions.

Regulatory Compliance – Rest assured that PAETEC has
the answers. Hundreds of PCI DSS, HIPAA, GLBA, and
SOX compliant customers use our network and security
solutions everyday. We have experience building compliant
networks, offering full compliance consultation, and
providing information required by auditors to guarantee
a smooth and worry-free certification process.
ADDRESSING REGULATORY COMPLIANCE

Consultation – PAETEC’s Security Operations Center                 Robust Internal Security Policies – In addition
can provide comprehensive consultation services to                 to an exhaustive list of products and services, PAETEC
assist you and assure that your network is meeting or              employs a wide-range of security best practices to meet
exceeding regulatory compliance guidelines.                        or exceed your compliance needs. PAETEC protects
                                                                   your network against label spoofing and does not share
Products – PAETEC’s wide range of security products                any internal MPLS label information with any partner,
can provide solutions either as a standalone or in                 customer, or Internet peer. We also limit and secure
combination for a multi-layered security solution.                 physical access to equipment in PAETEC facilities to
                                                                   trusted personnel only. In addition, these facilities are
ƒ   Hosted E-mail Security    ƒ   Managed CPE Firewall             monitored locally and remotely with reporting capabilities
ƒ   Hosted Web Security       ƒ   Managed Fraud Protection         that can signal intrusion. These are just a few of the steps
ƒ   Network Firewall          ƒ   Remote Access VPN                that PAETEC takes to protect your information and ensure
ƒ   Intrusion Detection &     ƒ   VPN Management                   security compliance.
    Prevention System         ƒ   Advanced DMZ Management




ENSURING NETWORK SECURITY & BUSINESS CONTINUITY

Scalability – Building a security infrastructure to support        Diversity – High availability redundancy is a very attractive
a network can be a daunting task, especially when today’s          feature of any core service, but PAETEC believes that
business environment is so dynamic. Offices open and               local redundancy does not address all potential threats
close, employees demand on-network elements changes,               to your business continuity. Therefore, we’ve placed our
and business volume can ebb and flow. PAETEC’s Security            Network Firewalls in geographically diverse locations to
products, such as Network Firewall, can provide the scalability    assure ongoing operations even in the case of a major
needed to react to these unexpected changes in the                 disaster. This diversity, in addition to redundancy, provides
business environment.                                              the best possible solution for network security and
                                                                   business continuity.
Redundancy – Customers who subscribe to the Network
Firewall product can take advantage of the robust security
and access control provided by the firewall functionality,
save on expenses, gain stability through the included Internet
                                                                                           INTERNET
access for their entire network, and rest assured that service
will always be available. All Network Firewall customers
are built into two firewall contexts which provide high
availability for firewall and Internet services. If a natural                   IDPS
                                                                          NETWORK
                                                                                                               IDPS
                                                                                                               NETWORK
                                                                           FIREWALL                            FIREWALL
disaster, fire, or equipment failure strikes the Central Office,          CLUSTER 1                            CLUSTER 2

which houses the primary firewall, our product will
automatically fail over to the second firewall and continue
functioning with an interruption that only amounts to                                        MPLS
a need to “refresh” a browser display on any end-user                                   ROUTING DOMAIN
computer in the customer network.

                                                                               SITE 1                         SITE 2




                                                                                              SITE 3




                                                                                                                           SECURITY
CUSTOMIZING SECURITY SOLUTIONS TO FIT YOUR NEEDS

ƒ Hosted E-mail Security – An extensive suite of                  ƒ Managed CPE Firewall – A PAETEC-managed,
  protective services, including Anti-Spam, Anti-Virus,             premises-based firewall solution that protects
  and Image and Content Control that scan your e-mail               your company from threats, plus gives options
  for a broad spectrum of dangerous or inappropriate                for IPS, Gateway Anti-Virus, URL filtering, VPN
  content and filter it out before it penetrates network            termination and management, and complex DMZ
  boundaries, gateways, or mail servers                             support and management

ƒ Hosted Web Security – A comprehensive service,                  ƒ Managed Fraud Protection – A robust security
  providing you with the necessary components                       solution designed to safeguard your business
  to secure and protect your Internet traffic from                  from charges associated with remote
  destructive viruses, spyware, and phishing threats,               international toll fraud
  while maintaining control of Web content for
  enforcement of acceptable usage policies

ƒ Network Firewall – A geographically diverse and
  redundant firewall solution that resides in the
  cloud, protecting your entire network at the edge
                                                                                                                              PSTN
  from threats, reducing network vulnerability,
                                                                                                  PBX MANAGED
  and freeing up bandwidth for legitimate traffic                                               FRAUD PROTECTION
                                                                CPE FIREWALL     CPE FIREWALL


ƒ Intrusion Detection & Prevention                                                         PRIMARY NETWORK
                                                                                               FIREWALL
  System (IDPS) – A new PAETEC
  product that works together with
  your PAETEC Network Firewall                                                 MPLS                          INTERNET
  service to provide both Intrusion                                            VPN
  Prevention Sensors (IPS) and                   CPE FIREWALL

  Intrusion Detection System (IDS)                                                        SECONDARY NETWORK                E-MAIL
                                                                                                                          SECURITY
                                                                                               FIREWALL
  protection for your entire network                            CPE FIREWALL     CPE FIREWALL
                                                                                                                     WEB
                                                                                                                   SECURITY
  through a quadruple-redundant
  and geographically diverse event
  correlation fabric that is actively
  monitored around the clock



www.paetec.com                                                                                                                       1457756


877.472.3832

Más contenido relacionado

La actualidad más candente

AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure MobilityCisco Canada
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryUKTI2014
 
FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheetdemoteam
 
hosting services hosting services
hosting services hosting serviceshosting services hosting services
hosting services hosting serviceswebhostingguy
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5Irsandi Hasan
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn securityJack Melson
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
Senetas fibre optic connections are secure - right
Senetas   fibre optic connections are secure - rightSenetas   fibre optic connections are secure - right
Senetas fibre optic connections are secure - rightresponsedatacomms
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
OpSource Enterprise-Class Security
OpSource Enterprise-Class Security OpSource Enterprise-Class Security
OpSource Enterprise-Class Security OpSource
 
3com H3 C Solutions
3com H3 C  Solutions3com H3 C  Solutions
3com H3 C Solutionsthouchin
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 

La actualidad más candente (20)

AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure Mobility
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th January
 
FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheet
 
hosting services hosting services
hosting services hosting serviceshosting services hosting services
hosting services hosting services
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Day1
Day1Day1
Day1
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
Firewall and vpn
Firewall and vpnFirewall and vpn
Firewall and vpn
 
Teknoforce
TeknoforceTeknoforce
Teknoforce
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Tivoli firewall magic redp0227
Tivoli firewall magic redp0227Tivoli firewall magic redp0227
Tivoli firewall magic redp0227
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
Senetas fibre optic connections are secure - right
Senetas   fibre optic connections are secure - rightSenetas   fibre optic connections are secure - right
Senetas fibre optic connections are secure - right
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
OpSource Enterprise-Class Security
OpSource Enterprise-Class Security OpSource Enterprise-Class Security
OpSource Enterprise-Class Security
 
3com H3 C Solutions
3com H3 C  Solutions3com H3 C  Solutions
3com H3 C Solutions
 
Ccna security
Ccna securityCcna security
Ccna security
 

Destacado

Maximizing business application functionality
Maximizing business application functionalityMaximizing business application functionality
Maximizing business application functionalityDavid Santos
 
Total Communications
Total CommunicationsTotal Communications
Total CommunicationsDavid Santos
 
One Communications Product Portfolio
One Communications Product PortfolioOne Communications Product Portfolio
One Communications Product PortfolioDavid Santos
 
AT&T Telepresence Solution
AT&T Telepresence SolutionAT&T Telepresence Solution
AT&T Telepresence SolutionDavid Santos
 
Procure to Pay Systems - Critical for CPOs to Deliver Value?
Procure to Pay Systems - Critical for CPOs to Deliver Value?Procure to Pay Systems - Critical for CPOs to Deliver Value?
Procure to Pay Systems - Critical for CPOs to Deliver Value?Petra Smith
 
Paetec Security Solutions
Paetec Security SolutionsPaetec Security Solutions
Paetec Security SolutionsDavid Santos
 
Oral communication
Oral communicationOral communication
Oral communicationvjfernandez
 

Destacado (9)

OneSolutions MPLS
OneSolutions MPLSOneSolutions MPLS
OneSolutions MPLS
 
Maximizing business application functionality
Maximizing business application functionalityMaximizing business application functionality
Maximizing business application functionality
 
Total Communications
Total CommunicationsTotal Communications
Total Communications
 
One Communications Product Portfolio
One Communications Product PortfolioOne Communications Product Portfolio
One Communications Product Portfolio
 
AT&T Telepresence Solution
AT&T Telepresence SolutionAT&T Telepresence Solution
AT&T Telepresence Solution
 
SAP Hosting
SAP HostingSAP Hosting
SAP Hosting
 
Procure to Pay Systems - Critical for CPOs to Deliver Value?
Procure to Pay Systems - Critical for CPOs to Deliver Value?Procure to Pay Systems - Critical for CPOs to Deliver Value?
Procure to Pay Systems - Critical for CPOs to Deliver Value?
 
Paetec Security Solutions
Paetec Security SolutionsPaetec Security Solutions
Paetec Security Solutions
 
Oral communication
Oral communicationOral communication
Oral communication
 

Similar a Paetec security solutions brochure

Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private NetworksDivam Goyal
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOWJoshua Sibaja
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochureIEI Integration Corp.
 
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...ADVA
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G NetworksPaul Bradley
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfTaherAzzam2
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
2. Explain the use of cloud management for centralized control of a .pdf
2. Explain the use of cloud management for centralized control of a .pdf2. Explain the use of cloud management for centralized control of a .pdf
2. Explain the use of cloud management for centralized control of a .pdfsales96
 

Similar a Paetec security solutions brochure (20)

Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
FortiGate_600E(2).pdf
FortiGate_600E(2).pdfFortiGate_600E(2).pdf
FortiGate_600E(2).pdf
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Firewall
FirewallFirewall
Firewall
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure
 
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G Networks
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdf
 
The vpn
The vpnThe vpn
The vpn
 
NGFW Brochure 08 08
NGFW Brochure 08 08NGFW Brochure 08 08
NGFW Brochure 08 08
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...
 
1500024 en
1500024 en1500024 en
1500024 en
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
2. Explain the use of cloud management for centralized control of a .pdf
2. Explain the use of cloud management for centralized control of a .pdf2. Explain the use of cloud management for centralized control of a .pdf
2. Explain the use of cloud management for centralized control of a .pdf
 

Paetec security solutions brochure

  • 2. WHY PAETEC SECURITY SOLUTIONS? Network security is a fundamental requirement for all businesses in today’s environment. The growing number and complexity of security threats requires a highly skilled team of security professionals seamlessly integrated with a layered defense plan to protect against hackers, malware, and other threats in the virtual world. PAETEC’s Security Solutions offer assurance that your business is getting the most bang for your broadband buck—all from one provider, on one bill, with one hand to shake. PAETEC’s Security professionals can provide personalized solutions based upon your business’ specific security needs. Whether you wish to utilize a network-based hosted security solution for scalability, meet with our Security Engineers who carry industry-leading certifications to discuss compliance, or build a complete layered security solution for your entire network, PAETEC can rise to the challenge. Productivity and Efficiency – Ensure that malicious content isn’t stealing your company’s valuable bandwidth and slowing your network services and employee productivity to a crawl. With PAETEC’s Security Solutions, you can unburden your IT staff from daily security tasks by letting PAETEC manage your security infrastructure. Peace of Mind – Leverage PAETEC’s Security professionals, who carry industry-leading certifications, including SANS, GIAC, and CISSP, as well as thousands of hours of experience protecting, troubleshooting, and remediating security issues across hundreds of customer networks. Cost-Efficiency – Enjoy PAETEC’s unique position as a Telecommunications Provider and as a Managed Security Service Provider (MSSP), which presents phenomenal opportunities for cost-savings through the use of such scalable solutions as our line of Hosted Security services that, on average, provide 65% savings compared to LAN appliance-based solutions. Regulatory Compliance – Rest assured that PAETEC has the answers. Hundreds of PCI DSS, HIPAA, GLBA, and SOX compliant customers use our network and security solutions everyday. We have experience building compliant networks, offering full compliance consultation, and providing information required by auditors to guarantee a smooth and worry-free certification process.
  • 3. ADDRESSING REGULATORY COMPLIANCE Consultation – PAETEC’s Security Operations Center Robust Internal Security Policies – In addition can provide comprehensive consultation services to to an exhaustive list of products and services, PAETEC assist you and assure that your network is meeting or employs a wide-range of security best practices to meet exceeding regulatory compliance guidelines. or exceed your compliance needs. PAETEC protects your network against label spoofing and does not share Products – PAETEC’s wide range of security products any internal MPLS label information with any partner, can provide solutions either as a standalone or in customer, or Internet peer. We also limit and secure combination for a multi-layered security solution. physical access to equipment in PAETEC facilities to trusted personnel only. In addition, these facilities are ƒ Hosted E-mail Security ƒ Managed CPE Firewall monitored locally and remotely with reporting capabilities ƒ Hosted Web Security ƒ Managed Fraud Protection that can signal intrusion. These are just a few of the steps ƒ Network Firewall ƒ Remote Access VPN that PAETEC takes to protect your information and ensure ƒ Intrusion Detection & ƒ VPN Management security compliance. Prevention System ƒ Advanced DMZ Management ENSURING NETWORK SECURITY & BUSINESS CONTINUITY Scalability – Building a security infrastructure to support Diversity – High availability redundancy is a very attractive a network can be a daunting task, especially when today’s feature of any core service, but PAETEC believes that business environment is so dynamic. Offices open and local redundancy does not address all potential threats close, employees demand on-network elements changes, to your business continuity. Therefore, we’ve placed our and business volume can ebb and flow. PAETEC’s Security Network Firewalls in geographically diverse locations to products, such as Network Firewall, can provide the scalability assure ongoing operations even in the case of a major needed to react to these unexpected changes in the disaster. This diversity, in addition to redundancy, provides business environment. the best possible solution for network security and business continuity. Redundancy – Customers who subscribe to the Network Firewall product can take advantage of the robust security and access control provided by the firewall functionality, save on expenses, gain stability through the included Internet INTERNET access for their entire network, and rest assured that service will always be available. All Network Firewall customers are built into two firewall contexts which provide high availability for firewall and Internet services. If a natural IDPS NETWORK IDPS NETWORK FIREWALL FIREWALL disaster, fire, or equipment failure strikes the Central Office, CLUSTER 1 CLUSTER 2 which houses the primary firewall, our product will automatically fail over to the second firewall and continue functioning with an interruption that only amounts to MPLS a need to “refresh” a browser display on any end-user ROUTING DOMAIN computer in the customer network. SITE 1 SITE 2 SITE 3 SECURITY
  • 4. CUSTOMIZING SECURITY SOLUTIONS TO FIT YOUR NEEDS ƒ Hosted E-mail Security – An extensive suite of ƒ Managed CPE Firewall – A PAETEC-managed, protective services, including Anti-Spam, Anti-Virus, premises-based firewall solution that protects and Image and Content Control that scan your e-mail your company from threats, plus gives options for a broad spectrum of dangerous or inappropriate for IPS, Gateway Anti-Virus, URL filtering, VPN content and filter it out before it penetrates network termination and management, and complex DMZ boundaries, gateways, or mail servers support and management ƒ Hosted Web Security – A comprehensive service, ƒ Managed Fraud Protection – A robust security providing you with the necessary components solution designed to safeguard your business to secure and protect your Internet traffic from from charges associated with remote destructive viruses, spyware, and phishing threats, international toll fraud while maintaining control of Web content for enforcement of acceptable usage policies ƒ Network Firewall – A geographically diverse and redundant firewall solution that resides in the cloud, protecting your entire network at the edge PSTN from threats, reducing network vulnerability, PBX MANAGED and freeing up bandwidth for legitimate traffic FRAUD PROTECTION CPE FIREWALL CPE FIREWALL ƒ Intrusion Detection & Prevention PRIMARY NETWORK FIREWALL System (IDPS) – A new PAETEC product that works together with your PAETEC Network Firewall MPLS INTERNET service to provide both Intrusion VPN Prevention Sensors (IPS) and CPE FIREWALL Intrusion Detection System (IDS) SECONDARY NETWORK E-MAIL SECURITY FIREWALL protection for your entire network CPE FIREWALL CPE FIREWALL WEB SECURITY through a quadruple-redundant and geographically diverse event correlation fabric that is actively monitored around the clock www.paetec.com 1457756 877.472.3832