Compliance & Professional Services
Dataway's team of network and security engineers have worked in thousands of unique environments providing expertise to organizations of all sizes. And our engineers have been with us for an average of 10 years, almost unheard of longevity for our industry. When you partner with Dataway, you can expect strategic advice and decision support, proper implementation of technologies chosen, and ongoing engagement. Rather than plugging in a device and moving on, we prefer to stay connected with our clients for the long term as a true partner and advisor.
Compliance Services
Policy Development
Data Protection Program
Cybersecurity Framework
Compliance and Best Practice Gap Assessments
Mobile Device Security
Network Security
Cyber Security Training
Security Assessments
Threat Mitigation
Vulnerability Management
Remediation Recommendations and Assistance
BCP/IRP/DR Testing and Validation
Access Control & Security Policy
Firewalls: Internet facing, internal data center, and branch office, high throughput >10Gbps, next gen application and content aware
SSL Application Portal: Traditional remote access solutions over SSL and internet and intranet facing application portals
AAA: Authentication, Authorization, and Accounting solutions for securing access to wired and wireless networks and management systems
802.1x: In combination with AAA to enforce authenticated access to all network resources
Content Security:
Web Proxy: Access control for web based applications
Networking
Routing: BGP, EIGRP, OSPF, Internet campus MAN, WAN, VRF, MPLS
Switching: 10GB Campus/data center
Wireless: Campus controller based, location
VPN: Integrated firewall
Load Balancing: Application resilience, performance scaling
MAN/WAN: MPLS, traffic shaping, QoS
WAN Acceleration: TCP optimization, caching, voice and video
Bandwidth Management: Application based traffic shaping
Virtual Office: Secure virtualized office systems including voice, video, VPN
Security Process
Assessment: Needs analysis, gap analysis, strategic planning
Compliance: PCI, HIPAA, GLBA, NERC
Security Information & Event Management: Tools for enforcing security processes and compliance
Log Management & Analysis: Archival, auditing, compliance
Vulnerability Assessment: Periodic technical assessment
Lifecycle Management: Strategic planning, infrastructure maintenance contracts, technology refresh
Threat Mitigation
Intrusion Detection/Prevention: In line and out of bound systems for detecting network based threats, events sent to SIEM for correlation and response
Anti-Virus: Host-based systems for malware detection
Botnet Detection: Cybercrime, espionage, targeted attack mitigation
Data Leakage Prevention: Protecting business critical data from unauthorized access
Encryption: in transit, at rest, compliance
Next Gen Data Center
Virtualization: Hardware abstraction, bare metal, multicore, large addressable memory spaces
SAN: Storage, iSCSI, FCoE
Fabric: Data center switching technologies
vDI: Virtual desktops, snapshots, thin provision
Unified Communications
Voice over IP: Hard/soft phone call control
Video: Telepresence, high definition, multiparty, training and content, multicast
Presence: Real-time availability, business efficiency
SIP Trunking: Bypass traditional PSTN, cost efficiency, performance and resilience
Mobility: Office communications portability to mobile devices
Voice over Wireless: RF Analysis, AP capacity planning, QoS, roaming