Security Solutions

1. Secure Critical Systems in the Cloud

Improve your cyber security readiness by protecting your data and key individuals’ computers with cloud backup. No more missing files, payroll archives or accounts with this system.

What is cloud storage?

Cloud Storage utilises the storage capacity and security of data centres to keep working copies of your most important data and systems available in a safe, secure and managed way.

How does cloud storage work?

Specialised software sits on your key systems and individuals computers allowing the files and data they have to be restored if damage or loss occurs.

2. Next Generation Firewalls (NGF’s)

Next generation firewalls help protect your system from malware attacks, encrypted emails, ransomware attacks and unauthorised access through the internet, while giving you unlimited internal IP addresses.

What are NGF’s ?

Next Generation Firewalls (NGF) are devices that sit between your internal network and the internet. In addition to standard firewall functionality, they utilize advanced intelligence to actively monitor the inbound and outbound traffic.

They leverage the power of the cloud to keep details of current threats and how they operate up to date and can block certain types of malware and ransomware from getting control signals to any internal systems that may have been compromised.

What do they do?

Next generation Firewalls give unlimteied internal IP Addresses. NGF ‘s improve your cybersecurity and help reduce data breaches and cybercrime.

They block cyberthreats such as unauthorized access to the network and everything connected to it. Next-generation Firewalls have additional analytical capabilities that can stop advanced cyberattacks such as malware, ransomware and encrypted emails.

Why are they important?

You wouldn’t leave your front door open to anyone who wanted to enter, right? Without a dedicated, updated firewall, all devices connected to your network, whether connected via Wi-Fi or a hardwired connection, each is an open door to the outside world.

3. Enabling Ireland Locations only

Limiting access to your system from Irish IP addresses will ensure most hacking attempts fail.

Why is it important?

Almost all malicious attacks originate from locations outside of Ireland. By limiting access from external addresses to only those from known Irish addresses you virtually eliminate most sources of direct attacks.

4.Password Writeback

Allow users to change and update their own passwords eliminating the need to use up your IT resources.

What is Password Writeback?

Your existing Microsoft systems have the ability to allow users to change their own passwords if they forget or simply need to update them at any time. Password writeback allows this functionality to operate even when the user is outside of the school, via the Internet.

What does it do?

Password Writeback Allow users to change and update their own passwords eliminating the need to use up your IT resources.

Why is it important?

Password writeback removes the need to set up an on-premises solution for users to reset their password. It all happens in real time, and so users are notified immediately if their password could not be reset or changed for any reason.

5. Multi-Factor Authentication (MFA)

Adding Multi-Factor Authentication significantly improves your overall security and is now a requirement for most organisations.

What is Multi-Factor Authentication ?

It is an authentication method that requires the user to provide two or more methods of verification in order to access a resource such as an email account, online account, or a VPN.

What does it do?

As well as asking for a username and password, MFA requires you to prove you have access to at least one other source of verification this could be a phone, another email address, or a smartcard. This ensures that only you have access to your account.

Why is it important?

Multi-Factor Authentication is important as your school systems contain sensitive information that needs to be protected and made accessible only to users with sufficient authorisation.