Page 6 - Catalog 2025 HTML Only
P. 6
from known computing devices. Additionally, once access is granted, the user is only allowed to access
items which are directly required to do their job. In other words, Accounting is restricted to authorized
users, same with Personnel files, databases and so forth.
Trend Micro Business Partner
GOOD: Network Defense Structure- Endpoint Security
Trend Micro is a provider of connected threat defense security services from the endpoint to the
network to the cloud. They’ve been around for 33 years and we’ve been using their products for the past
28 years. Trend Micro has been a proven product multiple times over.
We use Trend at the endpoint (the user’s PC) and at the Premise Domain Server for antivirus protection.
It automatically updates the threat tables so it takes the user out of the loop and insures accurate,
updated definitions at all times.
Trend also provides an e-mail filtering function and in today’s world, e-mail filtering is mandatory as that
is the number one intrusion route for network infection and data ransom/theft schemes.
Gateway Routing with Security Services
GOOD: Network Defense Structure- Gateway Security
Probably the most critical component of a multi-layer defense strategy is having the best firewall
available. There are a host of devices on the market. All of them will hook you up to the Internet. Some
of them will welcome intruders and others will defend the Gateway to the network.
We’ve been using SonicWall products for the last 18 years or so. SonicWall stepped into the network
security market in 1999 after transitioning from a basic Router company to one focused on providing
security devices for business operations.

