Network Security

Network management is critical for businesses. Poor network management can result in losses of data, productivity and brand reputation if sudden networking troubles strike. Businesses need the ability to monitor network status and be flexible enough to provide quick responses to any network problems that arise. The Core Security network management solution helps businesses plan and manage across LAN and Wireless LAN networks to improve productivity and simplify management.

Monitoring and Managing Networks in the Cloud: Managing network remotely is not always an easy job for administrators, especially when working on networks scattered across multiple sites or even countries. The Core Security Network Center (CSNC) is a public cloud network management system that enables users to check the health status of single or multiple networks anytime, anywhere.

Easy and Flexible Management: No matter where you are, it’s now easier than ever to manage networks on multiple sites through Core Security CSNC. Also, the multi-tenant architecture allows Core Security CSNC to manage customer networks with different privileges for more flexibility.

Single Pane of Glass Management: Manage networks on multiple sites and to monitor their on/off status, as well as the health of networking devices from switches, access points to gateways only with single platform.

Automated Configurations and Alerts: Core Security’s CSNC provides scheduled configuration backup and firmware upgrade to avoid network interruption. Also, it can send alert emails to administrators should any abnormality occur.

Gateway Management: Impregnable protection and optimization is achieved thru industry leading unified security gateways that thoroughly protect networks with industry-leading firewall, Anti-Malware/ Virus, Anti-Spam, Content Filtering, IDP, and Application Patrol functionality. Regulate unauthorized use of Web applications over your network, such as Facebook, Google apps, and Netflix, among others. Core Security security measures are enhanced with SSL Inspection, blocking threats hidden in SSL-encrypted connections while facilitating deeper policy enforcement. Furthermore, newly improved Content Filtering 2.0 enhances HTTPS Domain Filter, Browser SafeSearch, and Geo IP Blocking for an array of security enhancements to ensure clean Web connections.

Multi-element service access: The Core Security Unified Security Gateway Advanced Series helps organizations meet the connectivity demands of an ever-growing legion of wireless devices. Each gateway in the series is integrated with a WLAN controller that enables users to manage up to 34 APs through a centralized user interface. Businesses can now easily scale up WLAN and provide Wi-Fi in multiple areas, like meeting rooms and guest reception areas. Hotspot Management features — such as Billing System, Walled Garden, Multiple Authentications, 3rd Party Social Login, and User Agreement — to give businesses with a single unified solution for all required functionality.

Mail Security

Data Replication: In addition to regular backups, Core Security replicates Exchange 2010/2013/2016/2013/2016 data in real time from one set of premium hardware to another. This protects the critical information your business keeps within Exchange, even in the event of hardware failure or database corruption. It also enables Core Security to rapidly retore the full functionality of your Exchange environment should an issue occur.

Multi-tenant platform security: Multiple redundant, enterprise-class firewall systems integrate firewall, VPN and tra‑c management to prevent unwarranted intrusions and ensure only authorized users access your Exchange environment. We also use an intrusion detection system (IDS) to detect malicious network traffic and computer usage that often cannot be caught by a conventional firewall.

You’re about to entrust your company’s critical business data and email communications to a hosted Exchange provider. How confident are you that your information will be fully secure? At Core Security, we consider security fundamental to the premium service we provide our customers. In fact, our business is predicated on our ability to offer a more secure environment than our customers could deploy themselves on-premise. Our comprehensive approach to security has earned the trust of over 400,000 users who rely on our hosted Exchange services every day.

Content Filtering: Exchange customers can limit email content to comply with acceptable business use policies, company, state and federal communications regulations.

Encrypted Email: Email between mailboxes on our system is natively encrypted. Clients can also use our Secure  Mail to communicate externally with military-grade encryption

of email and attachments.

SAS 70 Type II Certification: Core Technologies is SAS 70 Type II certified company-wide, not just at the  datacenter level. This rigorous certification requires an independent auditor to validate, in their opinion, that the controls and processes in use are e_ective over its one year evaluation period.

PCI Compliance: Core Technologies has passed the strict testing procedures to be PCI compliant. This assures credit  card payments processed through a hosted site are secure from fraud and data compromise.

Fileshare Security

SecuriSync is Core Technologies’ business-grade file sync and share service. This collaboration service enables file and folder syncing across user devices, along with sharing features for distributing and syncing files both internally and externally. As its name implies, SecuriSync provides an extremely high degree of security and protection. SecuriSync’s protection features let administrators:

  • Assure compliance with security best practices, including leveraging Core’s strong password policies
  • Utilize remote wipe capabilities in case of lost or stolen devices
  • Keep content safe with at-rest and in-transit encryption
  • Assure reliability with a 99.999% financially backed uptime guarantee
  • Leverage enterprise-grade datacenters with redundant storage clusters and connections to multiple Internet providers
  • Protect content integrity with features that guard against accidental deletion or version conflict
  • Keep content in the right hands with permissions and access that are strictly controlled and easily amended