Chat with us, powered by LiveChat

Cyber Security

Businesses today face the very real risk of Internet-based attack and are exposed to numerous new information security and data protection challenges. Whatever size the business, the threat of disruption is real. We provide security solutions to fit every cyber security requirement.

Protecting your IT
infrastructure from danger

Backbone Connect has been the trusted infrastructure provider to mid-market businesses for over a decade, and has been securing customers’ critical IT assets for the same length of time. With an independent, practical approach, you can depend on us for affordable and effective advice in securing your business.

We provide a range of cyber security solutions to address any risks highlighted by an infrastructure assessment, ensuring that these are focused in the right way to balance impact and probability, while not forgetting crucial considerations such as budget.

Virtual firewall

Any business Internet connection, regardless of who provides it, requires dependable perimeter protection as a minimum requirement. Small to medium businesses cannot always justify the total cost of ownership of a hardware-based firewall solution, nor do they necessarily have the resources in terms of IT and networking skills to manage policy and maintain updates to the firewall platform.

For our business Internet and wide area network customers, we provide a perimeter firewall service, based upon a geographically diverse, high-availability platform which is fully managed in terms of monitoring, policy change management and maintenance of underlying infrastructure. This scalable, reliable, multi-customer security platform is an ideal entry-level firewall solution for small businesses who desire a simple-to-implement, hands-off approach to protecting their Internet perimeter.

Learn More

Key features

  • Dedicated, single firewall on premise
  • High availability firewalls on premise
  • Branch office firewalls
  • Centralised, hosted firewall(s) for your Wide Area Network (e.g. MPLS WAN)
  • Secure, remote-access solutions including multi-factor authentication
  • Multi-site Internet-based VPNs
  • Universal Threat Management (UTM), advanced firewall
  • Intrusion detection / protection service
  • Cisco Firepower solutions
  • Geo-blocking of inbound traffic

Dedicated firewall

The Internet perimeter is a vitally important element in protecting your business from external attack. We can help mitigate this risk with the provision of an advanced, dedicated firewall, configured and managed to meet your needs.

Every business is different, so we take a consultative approach to understanding your likely exposure and existing technology landscape. We help protect customers with single-site business Internet connectivity, as well as multi-site organisations that require centralised, high-availability perimeter firewalls deployed at the heart of their network. There is no one-size-fits-all answer to Internet perimeter security, so once we have a good understanding of your requirements, we’ll recommend a firewall solution to fit your needs.

Cisco Firepower
services

As Internet-borne threats become more advanced and small-to-medium businesses find themselves under increased risk of attack, your perimeter security must stay ahead of the game. The latest Cisco ASA firewalls are available with a full armament of defences, including:

  • Application Visibility and Control (AVC) – allowing businesses to be extremely granular in controlling access to specific apps, including the use of social media
  • ‘Next Generation’ Intrusion Protection System – providing threat prevention encompassing users, devices, users and content
  • Advanced Malware Protection – whilst user training is important in terms of reducing the likelihood of exposure to risky websites and opening e-mail attachments, Cisco AMP can discover, understand and stop malware as well as emerging threats
  • URL Filtering – ensuring that your corporate browsing access policy is enforced, by analysing URLs and matching against a risk score.

If your business has an existing Cisco ASA firewall running Firepower, or you are considering replacing an existing perimeter security platform and would like us to run it for you, then please get in touch.

Learn More

Cisco ISE

Today’s flexible working environment requires networks to be equally so. Locked down, inflexible networks prevent offices from allowing users to make use of all of their devices whenever they need them. Cisco Identity Service Engine is a network administration engine which allows organisations to manage end user devices being used on the network. Our NOC team is skilled in providing management of this service, allowing organisations to better protect their networks when confronting the challenges of Bring-Your-Own-Device networking.

Secure remote access

For businesses with mobile and remote users, access to business applications and data needs to be secure. For those with secured core networks, alternative solutions are needed to allow those remote users access. By providing the use of Virtual Private Networks (VPN) or Two-Factor Authentication (2FA), we can ensure our customers’ security remains intact, as well as the security of their remote user traffic, despite being beyond the protected core environment.

DDOS

A Distributed Denial of Service attack can cripple your business by flooding your Internet connection or hosted environment with a huge volume of traffic. Such attacks are increasingly common and can be challenging to mitigate, especially as such a high volume of traffic can render your traditional dedicated perimeter firewall useless. For our customers, we offer industrial-grade DDoS mitigation with a globally distributed architecture. If the risk of business disruption or loss of revenue resulting from a DDoS attack is a concern to you, then please get in touch to see how we can help.

Learn more

Risk Assessment/Audit

Assessing current level of risk or exposure to threats can be a complex procedure. The question is: where to start? A high-level, structured questionnaire might reveal key areas of focus, kick-start the process and help address the most pressing risk.

Simply adding boxes or software does not always result in reduced risk. Our approach in reviewing your IT risk is consultative, honest and in-depth, giving you the knowledge needed to need to reduce risk, and followed up with appropriate, affordable solutions.

How we work

We generally look at likelihood of a cyber incident and impact on the business when evaluating a business’ exposure to cyber risk.

  • Likelihood can be measured by how well cyber protection mechanisms (firewalls, anti-virus, patching, etc.) are implemented. UK certifications like Cyber Essentials can give a good indication if a business has reasonable protection mechanisms in place.
  • Impact is measured by looking at how the business operates in terms of reliance on the confidentiality, integrity and availability of IT systems and data. In other words, looking for what potential threats there are to the business and which of these would have the largest negative impact. International certifications like ISO27001 will add business risk analysis to what is offered through Cyber Essentials.

Vulnerability scanning and penetration testing

For an independent and thorough assessment of your Internet perimeter security, we can arrange for a vulnerability scan of your attack surface, encompassing all of your Internet-facing IP address space. You might wish to include elements of authenticated systems, allowing us to go one step deeper into your Internet-facing infrastructure. For example, for a user area of a website that requires basic username / password credentials, we can recreate a username / password breach and assess any exposure beyond the login.

Our trusted consultants can:

  • Perform vulnerability scanning on network and software elements. This non-intrusive method provides analysis of the vulnerabilities found on specific network elements, without the vulnerabilities themselves being exploited
  • Perform penetration testing, providing detailed documented findings and identification of the vulnerabilities that were exploited, with recommendations for improvements

So now you might be
interested in these...

Bringing the speed, scale efficiency and availability of cloud services to your business.

Read more

New options for collaboration and communication are here. We have all the options ready for you.

Read more

We’re enabling versatile workspaces with smart high-performance technology.

Read more

Making sure your people, data, sites and IT services are connected reliably and without disruption.

Read more

Leave the day-to-day IT to the experts. Free up business resources with systems that ‘just work’.

Read more

Plan for the future. Deliver new IT services into your business. On-demand experts are here to help.

Read more

Have a question
on cyber security?