With GTB’s Internet Security and Firewall Service, you can protect your company’s network and customer data.
Threats from malware, ransomware and viruses are always changing and evolving -- so it’s important to choose an Internet security service that keeps up with those threats and shields your business from them. GTB offers Internet security services that allow you to do business online with peace of mind.
With our secured managed Internet service, we design, configure, install and manage a top-of-the-line SonicWall firewall for you. The service is part of the GTB total managed solution and eliminates the need for businesses to spend large sums of money on hardware and software services.
This service includes a wired (wireless optional*) firewall utility configured with a "Total Secured Package" to perform:
- Deep Packet Inspection
- Bi-directional inspection
- Intrusion prevention
- Automatic signature updates
- Around the clock security updates
- Content filtering (must be selected by customer)
- Malware and Virus email reports
- Sandbox Advanced Threat Protection optional**
Get your free assessment to see if this solution is right for you or call 1 (877) CALL-GTB.
For a complete security solution, GTB also recommends:
- ESET Anti-virus and Anti-spam software with the ability to receive daily updates,
- Strong Box Remote Data Backup, and
- Cyber crime insurance (provided by a third party).
There are many Internet security companies that claim to offer the best protection, but the protection they offer may vary considerably from one service provider to another. GTB’s Internet security services give you a comprehensive, managed solution at a reasonable price.
Basic configuration uses SonicWall TZ300. Configuration for large networks may require a more enhanced utility box with upgraded scanning capabilities.
*Wireless firewall service can also be provided. Pricing varies.
**Sandbox is an optional Advanced Threat Protection service designed to provide secondary virus and malware analysis in the cloud for identified suspicious files. Files are passed to the network only after opened and cleared. This feature is priced separately.