Antivirus & Malware Protection

To offer our customers the best antivirus and spyware protection available Nittany Link has partnered with Symantec to offer our small business customers enterprise level protection.

Nittany Link Inc., a Symantec SMB Specialist Partner, offers products that can easily be integrated into your network infrastructure. Symantec Endpoint Protections solutions provide varying levels of protection based on your organization’s needs, while the Symantec Protection Suite offers both an integrated Antivirus/Spyware protection and backups for laptops and desktops.

Symantec Endpoint Protection

Symantec Endpoint Protection combines Symantec Antivirus with advanced threat prevention to deliver an unmatched defense against malware such as viruses, worms, spyware, Trojan horses, zero-day threats, bots and rootkits. This unified product delivers the most advanced technology available to protect against today's sophisticated threats and threats not seen before. It increases protection for laptops, desktops, and servers by including proactive technologies that automatically analyze application behaviors and network communications to detect and actively block threats. It is a single, comprehensive product that allows you to enable the capabilities you need as you need them. Whether the attack comes from a malicious insider or is externally motivated, endpoints are protected.

Firewall Appliances

Factors like Web 2.0 applications, streaming video, evolving threats and new threat delivery vectors are overwhelming both the security and performance of traditional firewalls. The stateful packet inspection firewalls installed over the years by many organizations are unable to detect malware embedded in network traffic, nor are they able to identify and control applications being used on the network.

SonicWall Firewall Appliances

By integrating gateway anti-virus, anti-spyware, intrusion prevention, content filtering, anti-spam and application control, the SonicWALL TZ Series of Unified Threat Management (UTM) Firewalls shatters these limitations by offering high performance multi-layered network protection. SonicWALL Application Intelligence and Control helps administrators control and manage both business and non-business related applications to enable network and user productivity. Utilizing SonicWALL’s unique Reassembly-Free Deep Packet Inspection™ (RFDPI) technology, the TZ Series delivers in-depth protection at unparalleled performance. 

The TZ Series also provides IPSec and SSL VPN remote access, VoIP, and 802.11b/g/n wireless, and 3G wireless multi-WAN connectivity. Designed for the needs of small businesses, branch offices, distributed enterprise sites, retailers and managed service providers, the TZ Series supports the highest speeds available from modern ISPs while delivering full UTM protection. Each TZ appliance is available as a SonicWALL TotalSecure™ solution, conveniently bundling all hardware and services needed for comprehensive protection.

Download Datasheet

Download Whitepaper "How Traditional Firewalls FailToday’s Networks"

Network Security Assessments

Fundamental Security Assessment: - We offer complete security scanning using proven, leading edge tools and a comprehensive inspection of security configuration by our ISA team. 

Access Control Systems and Methodology: – We provide highly trained professionals knowledgeable in techniques and implementation, identification and authentication processes and commonly employed types of attacks. 

Security Assessment Report (SAR): - We provide a complete report that includes assessment results and recommendations. 

System Hardening: - We will implement our recommendations to protect you from identified threats.

Assessment Capabilities

  • Accurate, high-speed asset discovery
  • Compliance auditing: FFIEC, FISMA, CyberScope Reporting Protocol, GLBA, HIPAA/HITECH, NERC, PCI, SOX
  • Configuration auditing: CERT, CIS, COBIT/ITIL, DISA STIGs, FDCC, IBM iSeries, ISO, NIST, NSA
  • Patch auditing: Includes patch management integration with IBM® TEM for Patch
  • Management, Microsoft® SCCM and WSUS, Red Hat® Network Satellite Server, and VMware® Go
  • Control systems auditing: SCADA systems, devices, and applications
  • Sensitive content auditing: PII (credit card numbers, SSNs) and intellectual property
  • Mobile device auditing: Lists iOS, Android™, and Windows Phone 7 devices accessing the network and detects mobile vulnerabilities
  • Credentialed scanning detects local vulnerabilities and conditions
  • Uncredentialed network-based scanning finds new hosts and vulnerabilities
  • Certified SCAP vulnerability scanner