Our network and security engineers at Straton Systems have experience working in thousands of different situations and provide their knowledge to businesses of all sizes. In addition, our engineers have been with us for an average of more than 15 years—a longevity that is virtually unheard of in our sector. You may anticipate strategic guidance and decision assistance, proper use of selected technology, and continuing engagement when you work with Straton Systems. Being true partners and advisors, we prefer to maintain a long-term relationship with our clients.

Compliance Services

* Policy Development
* Data Protection Program
* Cybersecurity Framework
* Compliance and Best Practice Gap Assessments
* Mobile Device Security
* Network Security
* Cyber Security Training
* Security Assessments
* Threat Mitigation
* Vulnerability Management
* Remediation Recommendations and Assistance
* BCP/IRP/DR Testing and Validation

Access Control & Security Policy

* Firewalls: Internet facing, internal data center, and branch office, high throughput >10Gbps, next gen application and content aware
* SSL Application Portal: Traditional remote access solutions over SSL and internet and intranet facing application portals
* AAA: Authentication, Authorization, and Accounting solutions for securing access to wired and wireless networks and management systems
* 802.1x: In combination with AAA to enforce authenticated access to all network resources
* Content Security: Web Proxy: Access control for web-based applications

Networking

* Routing: BGP, EIGRP, OSPF, Internet campus MAN, WAN, VRF, MPLS
* Switching: 10/40/100 GB Campus/data center
* Wireless: Campus controller based, location
* VPN: Integrated firewall
* Load Balancing: Application resilience, performance scaling
* MAN/WAN: MPLS, traffic shaping, QoS
* WAN Acceleration: TCP optimization, caching, voice and video
* Bandwidth Management: Application based traffic shaping
* Virtual Office: Secure virtualized office systems including voice, video, VPN

Security Process

* Assessment: Needs analysis, gap analysis, strategic planning
* Compliance: PCI, HIPAA
* Security Information & Event Management: Tools for enforcing security processes and compliance
* Log Management & Analysis: Archival, auditing, compliance
* Vulnerability Assessment
* Lifecycle Management: Strategic planning, infrastructure maintenance contracts, technology refresh

Threat Mitigation

* Intrusion Detection/Prevention: In line and out of bound systems for detecting network-based threats, events sent to SIEM for correlation and response
* Anti-Virus: Host-based systems for malware detection
* Botnet Detection: Cybercrime, espionage, targeted attack mitigation
* Data Leakage Prevention: Protecting business critical data from unauthorized access

Next Gen Data Center

* Virtualization: Hardware abstraction, bare metal, multicore, large addressable memory spaces
* SAN: Storage, iSCSI, FCoE
* Fabric: Data center switching technologies
* VDI: Virtual desktops, snapshots, thin provision

Unified Communications

Voice over IP: Hard/soft phone call control
Video: Telepresence, high definition, multiparty, training and content, multicast
Presence: Real-time availability, business efficiency
SIP Trunking: Bypass traditional PSTN, cost efficiency, performance and resilience
Mobility: Office communications portability to mobile devices
Voice over Wireless: RF Analysis, AP capacity planning, QoS, roaming