• How We Work
    • Overview
    • Our Approach
    • Our Work
    • Our Partnership
    • Our Value
    • Our Experience
  • Our Solutions
    • Overview
    • Managed Services
    • Professional Services
    • Governance, Risk and Compliance Services
    • Technologies We Use
  • How We See It
    • Overview
    • Whitepapers
  • About Us
    • Overview
    • Meet Our Team
    • Work With Us
    • Contact Us
  • Contact Us
  • Customer Login

Our Solutions

  • Overview
  • Managed Services
  • Professional Services
  • GRC Services
  • Technologies We Use

Compliance & Professional Services

Dataway's team of network and security engineers have worked in thousands of unique environments providing expertise to organizations of all sizes. And our engineers have been with us for an average of 10 years, almost unheard of longevity for our industry. When you partner with Dataway, you can expect strategic advice and decision support, proper implementation of technologies chosen, and ongoing engagement. Rather than plugging in a device and moving on, we prefer to stay connected with our clients for the long term as a true partner and advisor.

Compliance Services
  • Policy Development
  • Data Protection Program
  • Cybersecurity Framework
  • Compliance and Best Practice Gap Assessments
  • Mobile Device Security
  • Network Security
  • Cyber Security Training
  • Security Assessments
  • Threat Mitigation
  • Vulnerability Management
  • Remediation Recommendations and Assistance
  • BCP/IRP/DR Testing and Validation
Access Control & Security Policy
  • Firewalls: Internet facing, internal data center, and branch office, high throughput >10Gbps, next gen application and content aware
  • SSL Application Portal: Traditional remote access solutions over SSL and internet and intranet facing application portals
  • AAA: Authentication, Authorization, and Accounting solutions for securing access to wired and wireless networks and management systems
  • 802.1x: In combination with AAA to enforce authenticated access to all network resources

Content Security:

  • Web Proxy: Access control for web based applications
Networking
  • Routing: BGP, EIGRP, OSPF, Internet campus MAN, WAN, VRF, MPLS
  • Switching: 10GB Campus/data center
  • Wireless: Campus controller based, location
  • VPN: Integrated firewall
  • Load Balancing: Application resilience, performance scaling
  • MAN/WAN: MPLS, traffic shaping, QoS
  • WAN Acceleration: TCP optimization, caching, voice and video
  • Bandwidth Management: Application based traffic shaping
  • Virtual Office: Secure virtualized office systems including voice, video, VPN
Security Process
  • Assessment: Needs analysis, gap analysis, strategic planning
  • Compliance: PCI, HIPAA, GLBA, NERC
  • Security Information & Event Management: Tools for enforcing security processes and compliance
  • Log Management & Analysis: Archival, auditing, compliance
  • Vulnerability Assessment: Periodic technical assessment
  • Lifecycle Management: Strategic planning, infrastructure maintenance contracts, technology refresh
Threat Mitigation
  • Intrusion Detection/Prevention: In line and out of bound systems for detecting network based threats, events sent to SIEM for correlation and response
  • Anti-Virus: Host-based systems for malware detection
  • Botnet Detection: Cybercrime, espionage, targeted attack mitigation
  • Data Leakage Prevention: Protecting business critical data from unauthorized access
  • Encryption: in transit, at rest, compliance
Next Gen Data Center
  • Virtualization: Hardware abstraction, bare metal, multicore, large addressable memory spaces
  • SAN: Storage, iSCSI, FCoE
  • Fabric: Data center switching technologies
  • vDI: Virtual desktops, snapshots, thin provision
Unified Communications
  • Voice over IP: Hard/soft phone call control
  • Video: Telepresence, high definition, multiparty, training and content, multicast
  • Presence: Real-time availability, business efficiency
  • SIP Trunking: Bypass traditional PSTN, cost efficiency, performance and resilience
  • Mobility: Office communications portability to mobile devices
  • Voice over Wireless: RF Analysis, AP capacity planning, QoS, roaming
©2023 DATAWAY, All Rights Reserved. | Privacy and Cookie Policy