Security Concept_small

Network Security

Our portfolio of network security services is designed to help you before, during and following an attack by providing security assessments, complete design and build firewall solution implementations, and network security monitoring and management.

Firewall Implementations

Pomeroy combines deep network security experience and technical expertise to assess, architect, deploy and optimize client infrastructures. We maintain strong partnerships with leading technology providers and extensive industry certifications in order to provide advanced firewall solutions based upon your unique requirements.

Security Reviews

We lead consultative discussions on security and risk profile based upon your existing security architecture – firewalls, IPS, network and host-based security solutions. We base our analysis and recommendations upon your current environment, technologies and business goals.

Network Firewall and IPS Analysis

We analyze, validate and document firewall configurations – filters, inspections, permissions, translations, DMZ configurations, AAA configurations, and IPSec and SSL VPN connections. Recommendations are made on how to cost-effectively update and optimize the firewall architecture and deliver the appropriate solution.

Vulnerability Assessment and Penetration Testing

We provide in-depth analysis and documentation on network security gaps, vulnerability identification and exploitation, social engineering and web application attacks, and physical security assessments.

Monitoring and Management

We provide 24/7 support for client infrastructures – servers, storage, network, applications, security and mobility – across one or more geographically-dispersed locations through our U.S.-based Remote Monitoring and Management Centers.

We specialize in network security threat management, including event analysis, threat identification and remediation, and log management by collecting, aggregating and normalizing log data from operating systems, network devices and applications.

Take the next step toward Advanced Threat Protection. Let’s talk about what you need in order to protect your network, and detect and respond to threats and attacks.