Help Desk | Resources

Resources

Frequently Asked Questions

  1. How can Cebic Technologies see "inside" a company's computer system from off-site?
  2. How does firewall monitoring work?
  3. How does Cebic Technologies handle customers' confidentiality issues?
  4. How often does Cebic Technologies update virus definitions?
  5. Does Cebic Technologies guarantee virus protection?
  6. How does Cebic Technologies secure employees off-site access to client networks?
  7. Does the Off-Site Access option make a network less secure?
  8. How long does it take to set up Remote Intelligence service? How long to administer it? Does it add duties to a client's workload?
  9. Is a network required for monitoring?


White Papers and Reference Materials

  • 13 Ways to Protect Your Business
  • Security Legal Requirements
  • Security Terms and Definitions
  • Crash Course on Viruses
  • ISO 17799
  • Calculating the Cost of a Security Breach
  • Back Up Basics
  • Why Do Computers Crash?

How can Cebic Technologies see "inside" a company's computer system from off-site?

Cebic Technologies establishes a virtual private network (VPN), or a secure link between Cebic and clients companies, by using the Internet to create a tunnel. Cebic installs a firewall at the client's site and combines it with software that lets Cebic engineers monitor for viruses, security, and hardware and network issues. VPN systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

TOP

How does firewall monitoring work?

A firewall is a set of related programs located at a network gateway server that protects a private network's resources from users outside the network. A firewall uses a router program to filter all information coming into a network or leaving the network. The firewall then determines whether to forward data to its destination.

Cebic Technologies Remote Intelligence first establishes a firewall, if one does not exist, and then monitors the firewall for intrusions or attacks. To do so, Cebic monitors all activity passing through a company's firewall. Any unusual or unauthorized activity alerts Cebic engineers, who examine the activity and take appropriate action to permit or deflect the activity.

TOP

How does Cebic Technologies handle customers' confidentiality issues?

In this age of hackers and identify theft, security is-and should be-at the top of the list of concerns. Cebic Technologies approaches its work as other professionals do. Customers who entrust sensitive information to banks, accountants, doctors and attorneys can be just as confident about the integrity of their information when they work with Cebic.

All Cebic technicians undergo rigorous security screening and background checks prior to being hired, so each client can be confident they are qualified to work in data-sensitive environments.  Additionally, Cebic's technicians do not view anything other than necessary security items or affected documents within a company network.

In fact, before subscribing to the Cebic Remote Intelligence service, most businesses have wide-open networks that give anyone access to their data. After Cebic secures a system, customers have peace of mind knowing that their data is protected and intrusion protection systems have been put into place.

TOP

How often does Cebic Technologies update virus definitions?

Cebic Technologies technicians automatically update client systems once per day. New virus definitions are deployed as soon as we receive them.

Remote Intelligence protects each client from known viruses, and engineers watch for newly launched viruses and their definitions at all times. The Cebic Remote Intelligence Center is connected with early warning alert centers across the Internet. These centers automatically notify Cebic of any newly launched viruses. In rare instances, a newly launched virus may be introduced to a system before we have received the virus definition. In most cases, however, Cebic deploys new virus definitions before clients ever realize a new virus is circulating.

TOP

Does Cebic Technologies guarantee virus protection?

No. Cebic Technologies monitoring service could be compared to a smoke detector. The detector monitors for fires and alerts people to call the fire department (who will actually put out the fire). The actual smoke alarm does not prevent a fire-it merely alerts the people that a fire has started. Similarly, Cebic cannot promise that viruses, which become more complex every day, will not reach clients' networks. However, Cebic will install a rigorous alarm system to monitor and notify clients about viruses and other malicious code, and Cebic will eradicate viruses that have been defined and published. 

TOP

How does Cebic Technologies secure employees off-site access to client networks?

Cebic provides a service called Off-Site Access. Users receive instructions and specific setup instructions to log a laptop onto a virtual private network (VPN). Some clients choose the more secure option of a hardware VPN connection that can be set up between an office and a remote location.

TOP

Does the Off-Site Access option make a network less secure?

Off-Site Access without a hardware VPN will make a network slightly less secure. Here's how it works:  when the VPN is installed, all computers on the system must provide their IP addresses and passwords to access the network. When a traveling laptop is added to the VPN mix, the VPN must allow access from any IP address, as long as the user knows the password. If an intruder hacks into the network, their efforts to identify the correct password will alert Cebic technicians to the hacking activities immediately, and Cebic can counteract the intruder.

With hardware VPNs, system security won't be compromised, because the only VPN an external user can connect with is a particular IP address.

TOP

How long does it take to set up Remote Intelligence service? How long to administer it? Does it add duties to a client's workload?

Clients can expect to spend about 30 minutes to one hour with Cebic Technologies staff to complete paperwork. Most of the configuration work will take place between a company's Internet provider and Cebic. The installation of a VPN usually requires about one to three hours of on-site technician time.

Immediately upon installation of the VPN, Cebic is able to monitor the network. Viruses are identified instantly and clean up begins right away. Depending on how many viruses are detected, the removal process could take several days. 

Is a network required for monitoring?

No, a peer-to-peer network is sufficient as long as we can install our remote monitoring software on one of the computers. A peer-to-peer network is a group of computers connected to each other, without one central server storing all the information


TOP

 

Home | Expertise | Customers | Key Personnel | Certifications | Managed Services | Security Consulting | Vulnerability Assessments
Back-Up Solutions | Networking | Outsourced IT Support | Desktops, Laptops, Servers | Security Devices | Networking | Back-Up Solutions
Power Conducting Devices | Strategic Alliances | Resellers | Event Calendar | Recent Releases | Newsletters | Help Desk | Resources
Customer Portal | Forms | Contact Us

3225 S. Wadsworth Boulevard | Suite B | Lakewood, CO
1-888-232-4226 | 303-987-3679 | Fax 303-987-2560
info@cebic.com