End Point Device Security

Webroot Secure Anywhere Anti-Virus

We’ve been selling Anti-Virus software to our customers for over twenty years. It’s an important precaution and one we take very seriously. Read about how anti-virus software works here.
In 2015 we switched to Webroot Secure Anywhere Anti-Virus as our software of choice, and this is why:
Webroot is the fastest to install, to scan and takes up the least hard disk space. Webroot also uses 11x less memory when idle than the closest competitor. To see the Pass Mark 2014 Anti-Virus Performance Benchmark Report – click here. It compares 6 Anti-Virus products, looking at 13 metrics:

  • Installation Time
  • Installation Size
  • Boot Time
  • Scheduled Scan Time
  • Memory Usage during Initial Scan
  • Memory Usage during System Idle
  • Registry Keys Added
  • Browse Time
  • File Copy
  • Move and Delete
  • File Write
  • Open and Close
  • File Compression and Decompression
  • File Format Conversion
  • Network Throughput (previously named “Binary Download Test”)

Webroot Secure Anywhere Anti-Virus is our first line of defense when we work with new clients to ensure they have the strongest chance of withstanding attacks from viruses and malware. However, we have found that even with the best Anti-Virus software on the market, some malware is still slipping through the cracks.
Over the past decade we have seen threats to end point devices vastly increase and diversify. Where an anti-virus software used to suffice, we are now seeing an inundation of ransomware such as ‘Cryptolocker’ infecting computers and the networks to which they are connected.

The most vulnerable point to ransomware is email. It is important that all email users who value their network and PCs take special care to delete any unexpected mail. These malicious emails are coming in the form of bills, invoices, deliveries, fines and come from a variety of legitimate-looking senders.
AGL, Australia Post and the ATO are three organisations that have been fraudulently impersonated in recent months. If you or a user at your site receive a bill or official-looking email from either of these organisations that is not expected, delete it. If it is a legitimate communication, the organisation will follow you up.

How can you avoid malware?

Over and above keeping your Anti-Virus up to date, deleting any emails of unexpected bills, invoices, deliveries, fines etc? We recommend a review of your current back up procedures, ensure you have multiple copies of your backups, and ensure you can do a recovery quickly and efficiently. It has gotten to a point where it is not a matter of if you get ‘Cryptolocker’, but when. The people creating and modifying these threats are getting smarter all the time, with their phishing attempts being very professional.

These threats tie in to our new email scanning software: Trustwave. Trustwave Standard is a Secure Email Gateway that incorporates industry-leading web threat intelligence to effectively thwart emails that contain malicious URLs and deliver real-time, zero-day protection against the latest email-borne threats. Using our proprietary technologies, SpamProfilter, SpamBotsensor and Spam Censor, you can experience a consistent 99.5% spam catch rate with near zero false positives – all with no special tuning.

Trustwave Advanced utilised all of the Standard features plus a blended threat module: it rewrites URLs embedded in emails to route them through a cloud-based instance of Trustwave Secure Web Gateway to protect against malware and phishing attacks in real-time for any device. With attackers compromising URLs sometimes days after sending the malicious email, it is imperative to scan embedded URLs each and every time the URL is clicked.
The Trustwave Advanced product ensures that even when you click on URLs in emails from a mobile device, you are protected.
The product works with both on-premise SEG and SEG Cloud through a completely cloud-based infrastructure.
For information on Webroot, Trustwave or for a quote, click here.

Wireless Network Security

Wireless technology is changing all the time. The most recent iteration of wireless is the 802.11ac Wave 2, the latest and greatest iteration of Wi-Fi. As the fastest wireless standard yet, Wave 2 delivers maximum speeds of several gigabits per second, along with new functionality that, for the first time, allows multiple clients to communicate simultaneously. If your organisation is looking at upgrading or expanding your wireless network capabilities, click here to go to our dedicated Wireless Technology page to see how we can assist.

Meanwhile, organisations are changing the way they deploy access networks, connect devices, and enable business applications due to several issues. Security risks are inherent because of the number and variety of network-connected wireless devices and mobile applications present on a typical organisation’s environment. There’s a need to control who has access to what, as well as the standard firewall.

Our favoured WiFi vendors all have checks and measures in place to combat these threats. Mainly in the forms of network access control (NAC) and visibility.

You can read Gartner’s Market Guide for NAC here.

ClearPass from Aruba is one of the most prevalent Network Access Control products in the marketplace at the moment:

To learn more about how to secure your current or future wireless network, contact us.

Network Security

When it comes to firewalls for network security, BES IT Systems has forged as strong partnership with Fortinet.
Our award-winning network security appliances provide one platform for end-to-end security across your entire network. FortiGate next gen firewalls are optimized for internal segmentation, perimeter, cloud, data center, distributed, and small business deployments. Simplify your security posture with one security solution across your physical, virtual, and cloud deployments. Fortinet offer firewalls to suit different environments: entry level, mid-range, high-end and virtual firewalls.

Fortinet, in conjunction with BES offer a Cyber Threat Assessment to help diagnose where vulnerabilities may lie in your network.
Secure network architectures need to constantly evolve to keep up with the latest advanced persistent threats. There are two ways to find out if your solution isn’t keeping up—wait for a breach to happen or run validation tests.

A Fortinet Cyber Threat Assessment can help you better understand:

  • Security and Threat Prevention – which application vulnerabilities are attacking your network, which malware/botnets were detected, and which devices are “at risk”—for firewall assessment and security breach probability
  • User Productivity – which peer-to-peer, social media, instant messaging, and other apps are running—for application visibility control
  • Network Utilisation and Performance – what are your throughput, session, and bandwidth usage requirements during peak hours—network utilisation and monitoring tests for performance optimisation


  • Quick: Less than 7 days of monitoring
  • Easy: No interruption to your infrastructure
  • Comprehensive: Security, Productivity and Performance
  • No Cost

If you’d like more information or to register your interest for a Fortinet Cyber Threat Assessment, click here.

Cloud Security

It’s a broad issue, and one that spans public, private and hybrid cloud platforms. How do you protect your workloads in the cloud?
While in-built security in public cloud offerings are getting better all the time – take the Office 365 Security and Compliance Centre for example – it really is a shared responsibility. Whether you’re using a public, private or hybrid cloud solution, you need to protect what you put in the cloud.
FortiGate next generation firewalls (NGFW) are one of our favourite products for this task. NGFW lets you keep your workloads safe in clouds such as BES Private Cloud, AWS, Microsoft Azure and OpenStack-based. FortiGate NGFW are easy to manage and cost-effective. Get more information by clicking on the image below.

Fortinet Virtual Appliance Solution Data Sheet

Some of the benefits our customers enjoy with FortiGate include:

  • Tight integration to leverage scalability, agility, fast time-to-market
  • Support for the leading public cloud environments including AWS, Azure
  • Multiple security controls in one solution


Effective and Efficient Security for the Public, Private or Hybrid Cloud


IP Surveillance

If you have a physical premises with valuable goods onsite, it’s advisable to engage an expert to plan your IP Surveillance strategy.  BES IT Systems work with D-Link to provide state of the art surveillance solutions.  We offer a range of indoor and outdoor solutions with a range of storage and retention solutions for footage.  Our consultation services provide professional insight that can greatly improve the efficiency and effectiveness of your surveillance system.

Benefits of correctly configured and installed IP Surveillance include:

  • Deterrence of  intrusions and theft
  • Reduction of liability claims
  • Protection of assets
  • Reduction of impact to network speed
  • Compliance in the legalities involved with camera placement
  • Quality IP Surveillance cameras that gives clear, crisp footage.
  • Potential reduction of insurance premiums


For more information about security for your organisation’s network, call us on 3340 5555 or click the button below to log an enquiry.


Contact Us