I’ve been designing, building, and securing integrated digital networks for more than 2 decades.  The changes I’ve witnessed over that period are considerable.

Consider the impressive growth over the last few years in the variety of networked devices that control our infrastructure: HVAC, security cdevices2ameras, telephones, smart phones, TV over IP, other high-bandwidth media, printers, motion and fire alarms, building access control, climate monitors, industrial process controllers and now even our cars and refrigerators – just to name a few.   A truly robust and secure digital network has become essential because modern facilities depend on these systems, and a comprehensive approach that integrates them all is required.

Moreover, there are challenging decisions to make as to where your infrastructure resides: locally or in “the cloud”.  There’s no one correct answer, and each situation must Cloud computingbe carefully evaluated.  Initial investment and long-term costs, performance, reliability and redundancy,  security concerns,  future growth – all parts of this equation must be balanced and matched to the appropriate technology. The generic, “cookie cutter” approach to network design is a thing of the past.

Security certainly has changed over the years – transforming what used to be a ‘magic pill’  – also known as an ‘appliance’ based security model to a more modern practice that focuses on defense, detection, and response.  This new paradigm requires a more layered and nuanced approach that isn’t solely hardware-based but must encompass human factors as well; password protection, email phishing, and robust data analysis.

There are several features that distinguish my approach to network design:

  • No allegiance to market brands

I typically rely on open-source softwdownloadare – designing networks by carefully following network protocols rather than simply buying packaged commercial products.  The internet primarily FreeBSDlogoruns and relies upon servers running open-source operating systems.  Combining reliable software with the large array of excellent hardware that is available allows me to carefully tailor a technology solution that fits and supports your business goals.   I don’t maintain dealer relationships with any of my vendors, so freenas_logoyou can be certain that my recommendations are without bias.asf

  • Not just network management, but business management.

I have years of experience owning and running my own small-to-medium size corporations.  The networks I design are there to serve not just some technical specification, but more importantly your bottom line.

  • Years of experience in computer security.

I regularly  protect, detect and respond to threats on the networks of customers with sensitive and proprietary information.  The systems I create for you are based on years of experience with real-world security.

  • A Comprehensive long-view approach to infrastructure management.

I understand the value of a trouble-free infrastructure that lasts for years.  I choose the finest quality components, and my focus on open-source software means your network will be continuously upgraded, never going out of date.  Equipment choices follow a strict engineering standard for MTBF (mean time between failure) and each component is spec’d to operate at very conservative duty cycles.

  • A network that you own.

I meticulously document every network I create, ensuring that all the details of design are in your possession; passwords, network structure, and equipment documentation are preserved in a way that allows the network to be properly maintained in the years to come – regardless of who’s running the system.

 

Advertisements