Client Login
Username:
Password:
 Quick Contact
Name:
Phone:
Email:
Network Design & Setup
We provide complete Local Area Network (LAN) and Wide Area Network (WAN) solutions including design, setup and installation of network infrastructure, firewalls, network file services, group print services and collaboration services, automatic fax services and high speed dedicated Internet access.
Our network design takes into account not only the route the cable is going to take and the location of the router and the servers, but it also considers your organization hierarchy and information flow between every node in the hierarchy. Our team has engineers who have passed certification examinations conducted by networking giants such as CISCO, IBM, LINUX and MICROSOFT. They know network architecture and network topology intimately with the expertise and ability to handle your most complex need.
Areas of support include:
  • Firewalls: One of the most important components of network security is a company's firewall. Companies can choose from either a hardware or software variation, but we recommend that medium sized businesses utilize some type of dedicated firewall. It can be configured to make notifications if they detect anomalous behavior or if key network parameters move outside of normal bounds. Configuration and installation should be executed by someone with an in-depth understanding of your business, your needs, and your vulnerabilities.
  • Network Attached Storage (NAS): This architecture allows for additional data management
  • Network Monitoring: Installation of software that constantly monitors devices and traffic on your network. This software can be used to assure the network's integrity, quickly identify threats, breach attempts, or penetration, and identify the location and nature of problems.
  • Network Performance Improvement: There are a wide range of problems that might cause a "slow" network. These included hardware errors, configuration errors, partial failures, lack of storage, user behavior (downloads or net-radio), outgrown capabilities, ISP problems, or user-machine problems. Effective tools and experience are used to diagnose and remedy the issues.
  • Network Security: This consists of assuring that your network and the resources attached to the network are restricted to authorized individuals and that the resources are not damaged, removed, compromised, or made inaccessible. Networks may be attacked from inside or outside your organization. The most important elements of network security include authorization, architecture, monitoring, firewalls, and virus protection. Compromised networks may need analysis or upgrades. More sophisticated elements include intrusion detection, honey-pots, dynamic reconfiguration, or self-healing.
  • Security and Administration: The baseline for the security of any network is User Authentication. The system administrator must implement and maintain a password policy, and manage employee changes. Various authentication systems are available including LDAP or Windows Active Directory.
  • Virus Protection: Includes specialized software that works at either the company's network level or on individual workstations. Software scans incoming email messages and other types of network traffic looking for any of thousands of known viruses. Individual user virus protection also inspects the current machine, looking at tasks, services, the registry, the file system and other places where viruses, worms, spyware and other unwanted pieces of code (malware) can hide. Some software looks at behavior of applications or network services to detect anomalous behavior. More sophisticated networks can then automatically isolate the infected network segment.
  • Virtual Private Networks (VPN): A Virtual Private Network (VPN) is just what it sounds like—a "private network" of encrypted data that runs over the regular public Internet. A VPN allows your employees to work from home, accessing everything on your local office network just as if they were working in the office. It’s safe, it’s fast, it’s secure, and it’s transparent to applications and users.
  • Email Setup and Optimization: Most companies have multiple mail domains. Issues include multiple protocols (POP, IMAP, web-based) synchronization, storage, and security. There are often practical issues of domain management, consistent user names, best practices, business etiquette, and efficiency. Email systems today usually incorporate spam filters. Importantly, there are now legal issues involving storage, management and deletion of email. Dual Layer can advise, install, migrate, upgrade, and train your employees.