COL believes that it is often necessary to look at the bigger picture, for example downtime caused from unauthorized people getting into your network and increasing productivity/flexibility/effectiveness/profitability by allowing secure remote access to your network by authorized employees away from the office. It is necessary to prevent unauthorized access to our clients network while at the same time authenticate the identity of authorized users and computers to maintain an appropriate level of network service operations and optimal network performance.
COL Provides Network Security addressing five main security objectives:
- Denies Access – Prevent unauthorized entry.
- Authentication - Proving identity to gain access.
- Integrity - Ensuring only authorized personnel can amend data.
- Confidentiality - Restricting data access.
- Non-repudiation- Decisive tracking of actions to a specific user