Showing posts with label cyber security. Show all posts
Showing posts with label cyber security. Show all posts

Wednesday, October 26, 2016

Datto Business Continuity and Disaster Recovery (BCDR)

JKS Cyber Security Solutions

From virtual cloud information to physical endpoint records and the frameworks that process it all, data is everywhere. JKS and our partner, Datto, can provide total data protection makes your business powerful, secure, and quickly restorable anytime it is needed.

Our solutions protect organizations from IT disasters, human error, and malicious activity. With JKS and Datto safeguarding your business, you are ensured business continuity with continuous access to data on location, in travel, and in the cloud.

• Ransomware Protection
• Business Continuity & Disaster Recovery
• Disaster Recovery as a Service
• Cloud-to-Cloud SaaS Backup


What is Business Continuity?
Data facilitates your core business. Spontaneous occasions like characteristic debacles, innovation disappointments, noxious movement, or client mistakes are probably going to debilitate (or halt) your operations with downtime.

Business Continuity and Disaster Recovery (BCDR), is based on these three tiers:
1. Protecting data and systems
2. Redundant copies of data to protect your business from ransomware
3. Virtual compatibility to recreate IT infrastructure on the fly

Contact us now to learn more:
security@jks-systems.com / 860-436-4664
www.jks-systems.com

Wednesday, October 5, 2016

JKS Cyber Security – October is the national month of Cyber Security Awareness.

One point of National Cyber Security Awareness Month (NCSAM), every October, is to provide business owners with the assets to ensure their property and client information. In a period of developing cybercrime, a safe and secure Internet is essential to building a successful business.
As business owner, you can make the Internet more secure by taking an interest in National Cyber Security Awareness Month. Consider JKS to help your business become more secure.
Breaches in security by thieves, hackers, and intruders can be lessened by practicing some basic physical and network security protocols such as:
Implementing a security system on the premises.
Requiring that all employees and visitors wear badges to identify them.

Enforcing computer security measures such as logging out of work stations when they are not in use.
  • Requiring employees to use complex passwords that are not easily guessed.
  • Requiring employees to frequently change passwords.
  • Preventing employees from logging into personal email accounts.
  • Preventing employees from accessing sites that may jeopardize the security of the network.


To help secure your internet JKS offers:
  • Disaster Recovery
  • Network Security
  • Network Assessment
  • Backup



Disaster Recovery
Having a solid Disaster Recovery plan is imperative to ensure the security of your business. A Disaster Recovery plan is a set of policies and procedures which allow a company to recover and continue business as usual in the event of a natural or man-made disaster. These plans must consider all foreseeable and non-foreseeable events such as: floods, earthquakes, hurricanes, tornadoes, malicious attacks (viruses, acts of terrorism), hazardous material events, power failures or surges, etc.

Benefits of Implementing a Disaster Recovery Backup Plan:
  • Ensuring your business can continue to operate in the event of a disaster.
  • Reducing downtime by mitigating disasters.
  • Customer retention.
  • Increase the confidence of your partners and clients.


Network Security
Keeping your network secure allows your employees to focus on their job duties without interruption. Breaches in security can bring down entire networks, damage software and hardware, as well as cause you to lose critical data. Companies and their clients are becoming more vulnerable as personal data is being readily shared over the internet. Digital data collection allows companies to be more versatile and have a broader customer base, but also opens up the possibility of a security breach.

Strong Network Security Protocols Include:
  • Intrusion Detection Systems (IDS) or Intrusion Protection Systems (IPS)
  • Firewall
  • Anti-Malware software and scanners
  • Virtual Private Networks (VPN)


Network Assessment
Network Assessments usually begin with constructing a network map which depicts your network layout. We analyze all hardware and software and create an inventory report. We can then provide summaries of all devices and identify any that may have performance issues to prevent any future problems. We can help you create a remediation plan to correct any problems your network may have as well as provide steps to optimize your performance.

The assessment measures and analyzes the performance of:
  • Network components such as switches, routers, and hubs.
  • Applications used for email, databases, antivirus removal, and backups.
  • Security measures such as firewall.
  • Disaster Recovery or business continuity capabilities and plans.
  • Remote access such as VPN, mobile devices, or terminal servers.
  • Network infrastructure such as wiring and switch configuration.


Backup
As the use of technology continues to grow, so does the volume of data companies are accruing. Data is an integral part of any company’s business. However, it is imperative to have a solid practice of backing up the data to ensure no loss occurs. Maintaining the backup regimen and data library can be a daunting task, especially for small businesses with no dedicated IT department.

Benefits of Backup:
  • Business Continuity
  • Data Insurance
  • Flexible Local Storage
  • Reduced Recovery Time



Contact us now to learn more:
security@jks-systems.com / 860-436-4664
http://www.jks-systems.com/service-category/security/


Thursday, September 22, 2016

JKS Access Control Solutions Week – HID Lumidigm® V-Series V4xx Fingerprint Sensors and Modules


The Lumidigm V4xx Fingerprint Sensors and Modules combine convenient and reliable biometric authentication with variety of security features including strong liveness detection, data encryption and tamper resistance to provide an exceptional user experience while eliminating fraud and protecting identities.
Ideal for banking applications, the V4xx offers individual bank customers easy and worry-free access to their accounts. And, because institutions need to know who is actually present for the transaction rather than simply who has the card or knows account details, the V4xx provides a cryptographically secure channel that is protected by tamper detection for true end-to-end security.


Key Benefits
  • Eliminates fraud — Knowing who is transacting is critical. Biometric authentication binds a credential to an individual, ensuring that the person transacting is who they claim to be.
  • Establishes trust — Data communications between the V4xx and the institution's systems are secure, ensuring the integrity of the transaction.
  • Simplifies access — Quick and easy to use, the V4xx allows individuals to access their accounts with a single touch of a finger.


The V4xx supports multiple deployment scenarios to meet the specific system requirements of each business. Simplify financial transactions for users while eliminating fraud for financial institutions with the Lumidigm V4xx Fingerprint Sensors and Modules.

Key features of the Lumidigm V-Series V4xx Sensors and Modules are as follows:
  • Cryptographic toolkit
  • Physical tamper resistance, detection and response
  • Mutual authentication between the host and the sensor
  • Encrypted and authenticated firmware updates
  • Lumidigm multispectral fingerprint technology with liveness detection


The customizable V4xx may be deployed unlocked in anticipation of future enablement of cryptographic features; off-the-shelf with one of five provided cryptography transaction models; or as a fully customized solution with a proprietary, customer-specific cryptography transaction model.
For maximum flexibility, the unlocked V4xx is backwards compatible to SDK v2.50 and can be deployed alongside previously deployed Lumidigm V3xx sensors.

For more information, contact us at:
860-436-4664 / security@jks-systems.com

www.jks-systems.com

Thursday, September 8, 2016

JKS Campus Security Solutions Week #3– Axis PTZ Dome Network Camera



Axis PTZ dome network cameras provide pan, tilt and zoom functions, enabling wide area coverage and great details when zooming in.



The PTZ domes may support features such as:
  • ·         Guard tour
  • ·         Tour recording
  • ·         Audio, input/output ports for external alarm devices
  • ·         Axis' Zipstream technology
  • ·         Gatekeeper functionality
  • ·         Autotracking
  • ·         AXIS Camera Application Platform for intelligent video applications
  • ·         Weather-proofing - including Arctic Temperature Control for extremely cold conditions


A wide range of accessories is available, including joystick for easy maneuvering and mounting kits for indoor/outdoor installations.

For more information on Network Cameras, contact JKS at:
security@jks-systems.com / 860-436-4664


Saturday, July 30, 2016

JKS Systems Cyber Security Solutions- Cisco Advanced Malware Protection


Cisco Advanced Malware Protection is the industry's leading malware protection solution.

With a database of over 500 million known files and over 1.5 million new incoming file samples every day, AMP provides not only global threat protection but also extensive visibility during and after a malware attack.

·         Enhanced Threat Defense - Automatic protection against millions of malicious files. Retrospective detection if a file is discovered to be malicious after it enters the network
·         Contextual Visibility - Pivot easily on a particular threat, client, or external threat source. New Security Center provides a quick way to see threat data across multiple sites
·         Rapid Detection - Automatic alerting for retrospective malware detection. Protection against new and emerging threats through the work of Cisco's TALOS team
·         Ease of Management - Enable best-in-class malware protection with just two clicks. Configuration and reporting integrated natively into Cisco Meraki's cloud dashboard


WHY AMP ON MERAKI MX?
The threat landscape is constantly evolving, and it's more important than ever to have a security solution that does more than just block malware. Security experts increasingly agree that deep visibility is crucial to maintaining effective network security.
With AMP, a world class malware database is paired with context-aware monitoring and reporting, retrospective malware analysis, and Threat Grid sandboxing to provide an anti-malware solution that does more than just prevent users from downloading malware – it provides comprehensive security before, during, and after a malware attack.
Best of all, integration into the Cisco Meraki cloud dashboard means it's incredibly easy for Meraki MX customers to configure and monitor AMP, or to move seamlessly back and forth between threat intelligence and network management.

NEW AMP FEATURES
·         Real-time malware blocking
Automatically check downloaded files against the global AMP database in real time and block malicious files before they can pass through the network perimeter. With the new Security Center you get a straightforward summary of threats seen across all of your networks, or drill down into the details of a particular attack or threat.
·         Retrospective malware detection
By maintaining information about files even after they are downloaded, we can report on files that were determined to be malicious after they were downloaded. We even send automatic email alerts informing you that a file downloaded previously on your network has been newly discovered to be malicious so that you can investigate and take action.
·         Threat Grid (coming soon)
Get unmatched protection against emerging threats by sending unknown files to Threat Grid to be executed in a virtual environment. Threat Grid matches actions taken by those files against over 625 behavioral indicators. Even better, Threat Grid's findings are reported to the AMP cloud so that all AMP customers will be protected against newly discovered malware.


For more information, please contact JKS at:
security@jks-systems.com / 860-436-4664
www-jks-systems.com



Monday, July 25, 2016

JKS Cyber Security Solutions - Array Networks Juniper SSL VPN Replacement Program



For customers feeling left in the cold by Juniper's decision to divest its Pulse business unit to private equity firm Siris Capital Group, Array's Juniper Replacement Program provides a means of migrating from a product with an uncertain future to a next-generation solution from a company dedicated to the SSL VPN and secure access market.

·         Free Hardware-
Scalable hardware capable of replacing any size Juniper SA or MAG platform
                       
·         Free Software-
Industry-leading feature functionality that meets or exceeds Junos Pulse

·         Free User Licenses-
100 concurrent user licenses included      
              
·         Discounted Support-
Simply purchase a 3-year Array gold support contract at a 30% discount


Between now and September 30, 2016, trade in your Juniper SSL VPN and receive free hardware, software and concurrent user licenses from Array Networks. Your only out-of-pocket is the purchase of a 3-year gold support contract at a 30% discount. Applicable to all Juniper SA, MAG and Pulse product lines.

For More information, contact JKS at:
security@jks-systems.com  / 860-436-4664