contact integralink
Back to the Main Page
Q: How do I start service with integralink?
A: An integralink sales associate would contact you within 24 hours to schedule a meeting with an IntegraLink network engineer. The engineer will evaluate your needs and structure your network, outlining your hardware requirements, as well as your bandwidth preferences.
Q: I need my information secured so no one can access it, can integralink do that?
A: Yes, we offer a great deal of managed services from local area networking to operations support, as well as many others. integralink has several levels of security you can choose from. Depending on your requirements and situation, we can build a security structure for you..
Q: What hardware would I need to buy bandwidth from integralink?
A: You would not have to buy any hardware at all. We will provide you with pre-configured Cisco® routers to suit your specific application. Other hardware would be determined based on your bandwidth requirements. There are no hidden costs, the engineer and sales associate state all costs to you.
Q: Besides bandwidth, what does integralink offer?
A: integralink provides full-scale solutions for your business. We offer not only bandwidth, but also full security solutions, managed services such as Microsoftâ operating system support, email support, and hardware support. We can also add to or rebuild your current physical network infrastructure.
Q: I have heard the term encryption. What does it mean?
A: Encryption is the use of a complex mathematical algorithm based on large prime numbers to scramble or “encrypt” your original data or message that is called “plaintext” into “ciphertext.” The person holding the decryption key, the intended recipient, unscrambles or “decrypts” the ciphertext back to plaintext. This is usually a transparent process, meaning that the sender and the recipient do not see the process.
Q: My company isn’t connected to the Internet. Should I be concerned about my system’s security?
A: Yes. Approximately 70% of network attacks originate from inside the company or network. The attackers can be present or former employees unhappy with the company and a mind set on revenge, or even someone working for competitors out to obtain details on your company.
Q: If I have a firewall in place, why would I need an Intrusion Detection System?
A: A firewall should be your first line of defense, but not your entire information security system. A firewall controls data coming in and out of your network through pre-determined definitions, keeping an attacker from penetrating your systems - but it is not 100% secure. An Intrusion Detection System (IDS) is a process that can identify and respond to malicious activity against your network. It can be active, allowing you to prevent and stop attacks, or it can be passive, by monitoring and logging the activity in an audit log.
Q: What is a Denial of Service Attack?
A: A Denial of Service attack denies the users of a system access to and/or use of that system. It is one of the most common attacks and can be just a nuisance or part of a larger, more sophisticated system attack that can render it useless for days or even weeks
Q: Is there any way to ensure that we are safe from attack?
A: No, regardless of the security measures you may now have in place. The best thing that you can do is to take a proactive approach to your security program through regular testing and an eye to emerging security technology, make it a top priority and minimize the risk.
Q: We upgraded our security system a few years ago. We don’t feel that we are at risk, so why should we feel the need to review what is working just fine right now?
A: Do not be so sure. New technology is introduced constantly, and if you can get it, so can unauthorized users of your system. In fact, it is quite possible that an intruder has more advanced technology than you have, especially if your security system has not been upgraded within the past one to two years. Do not feel alone. Even firms who are knowledgeable about information security have, either willingly or unwillingly, placed their security needs on the “back burner” due to budget constraints and other issues, and subsequently are vulnerable to penetration of their systems.
Q: We’ve never had a problem with someone attempting to penetrate our system. Why should we be concerned now?
A: Just because you believe a penetration to your systems has not happened yet does not mean that it will not occur in the future or that it has not happened already. The proliferation of the Internet, the increased sophistication of network systems, and our interdependence on a world economy and the systems that support it place every network at risk now more than ever.
Q: What is the difference between a basic scan, remote audit, and a penetration test?

A: A basic scan provides a high-level quality assessment of the level of security risk that may exist in an organization’s external system. The scan provides a simulation as to how someone without any knowledge of your organization or computer system might attempt to penetrate your systems. InterNascent scans all the Internet Protocol (IP) addresses in your system, searching for the most prevalent vulnerabilities.

A remote audit consists of a detailed analysis of the level of security present within your Internet connection and your external system. We identify and assess vulnerabilities and risks to your system. A Denial of Service Attack may be a part of this audit.

A penetration test simulates an attack by an intruder who is attempting to determine whether any potential weaknesses exist in your system’s defenses. As part of the test, we evaluate Web-based applications and authentication methodologies, including a configuration test of the Web server, evaluation of file system security, and other tests. A Denial of Service Attack test may also be included with the penetration test.

Using the most advanced software technology, tools, and equipment, we perform all of these tests multiple times in order to ensure accurate and comprehensive results.

COPYRIGHT © 2001 integralink communications. All rights reserved.
Get Connected With Us!

Why are we #1?Why are we #1?

Your network should be secure...

Find a Job with integralink