Serving Cleveland firms since 1997
Eric is working at JurInnov, Ltd so we are no longer accepting new customers. We hope you understand this decision. It has been a pleasure serving you for the past 10 years. Please visit JurInnov for your security consulting needs.
Company founder, Eric Vanderburg, publishes the article Implementation to Instruction - Is teaching next on your Horizon? in Certification Magazine.
Independent Systems Consulting celebrates its 10 year anniversary. Join us at BW-3 Grill & Pub in Rocky River.
20412 Center Ridge Rd.
Rocky River, Ohio 44116
Independent Systems Consulting helps sponsor the Computer Crime and Surreptitious Attack Seminar at Remington College, Cleveland-West Campus.
Perimeter defense is an important component of information security. Independent Systems Consulting is experienced in firewall architecture and design. We can work with your company to deploy and maintain one or more firewalls at your presence. We work with open source SmoothWall firewalls and Snort Intrusion Detection Systems (IDS). Open source allows you to keep your security costs down but still maintain high levels of protection.
Our firewalls use a security-hardened GNU/Linux operating system called Smoothwall with the option of adding an Intrusion Detection System (IDS). We are the number one SmoothWall provider in Cleveland, Ohio. We run the entire firewall off a CD-ROM allowing for a firewall to be upgraded or replaced easily and enhancing the security of the offering. The advantage of our solution is that once the configuration is built on the CD, it cannot be changed. A hacker cannot modify your configuration. When you need to make a change such as adding another network or new equipment, simply call us and we will make the necessary configuration changes and send out a new CD. Old configurations are easy to archive as they are already stored on the CD. The process is easy. Remove the old CD and insert the new one. The new configuration will take place once the firewall is restarted.
The optional IDS uses snort and is fully integrated into the setup. The IDS uses signatures to detect more advanced forms of attack than a firewall alone can detect. Rules are configured to block these attacks, keeping your network and business safer.
Most small business environments require only one firewall but we will work with you to identify your requirements and implement the best perimeter defense strategy for you. Sometimes this requires more than one firewall, especially if there are multiple points of entry to the network.
A typical firewall implementation will include the outside network which connects to your Internet Service Provider (ISP), a Demilitarized Zone (DMZ) which houses externally facing resources such as web servers or FTP servers, and your internal network where your workstations and other servers reside. We will also include a wireless segment if you utilize wireless services. This can all be setup with one SmoothWall firewall. Initial firewall setup and configuration for one firewall is $1000. Additional firewalls are only $800.
We offer two options for a new setup. You can provide the server or we can provide it. Hardware requirements depend on your environment and Independent Systems Consulting staff can help identify appropriate requirements. If you would like Independent Systems Consulting to provide the hardware this typically costs $800.
Managed security services require a monthly fee. This fee covers configuration changes and updates to the system. Pricing depends on the number of servers and workstations at your location. Please see table 1 for pricing. When firewall updates are released we will work with you to schedule a time to upgrade the system. You can use our ticketing system to request a change and we will promptly make the configuration change and provide you with a new CD. If, for some reason, you need to go back to the previous configuration, all you have to do is insert the old CD and restart the firewall.
|Number of Servers||Monthly Cost||Firewall + IDS|
|More than 50||Call for price||Call for price|
|Managed Security Services|
|Information Security Strategy|
|Security Governance - Policies and Procedures|
|Security Awareness Training|
|Business Continuity Consulting|