Network Control

☂️ Meets cyber security insurance requirement

What is it?

Network Control acts as a firewall for endpoints and servers, providing comprehensive oversight of network traffic to safeguard your devices. With crafted policies, granular access is manageable based on factors such as IP addresses, designated keywords, agent verification, or dynamic Access Control Lists (ACLs).

Why it's important?

The corporate firewall is no more the only way to stop unauthorized network access. Users are not only working from the office but also remotely, meaning that the network we all utilize has quickly become the internet. This dissolution of the perimeter leaves devices and data vulnerable and exposed to cyber threats. This is why you need controls on network traffic in place to protect your device and, by extension, your data. You can achieve this by choosing Core+ and enabling Network Control with Puma’s Managed IT Services.

How it works:

Puma’s engineers deploy Network Control and configure it to allows for centralized firewall policy management across all endpoints. Whenever a connection request arises, it verifies whether the requesting endpoint has authorization. Upon confirmation, it activates the desired port on the device. Devices that haven't been granted access remain unaware of the open port's existence. Upon the time rule being met, the port automatically closes 5 minutes or after it is no longer in use by an authorized device.

What are the benefits?

Configurable

Using global and granular policies, Network Control allows users to configure network access to endpoints.

Cloud-Based

The cloud-managed solution provides customers with a centralized view of endpoint policies and network traffic across your organization.

Dynamic

Network Control enables users to deny all traffic to published servers while only allowing a single computer by IP address or dynamically using a keyword. This is great for a user who is often traveling.

Enhanced Network Security

Ensure rogue devices on your network cannot access your servers or endpoints with Dynamic ACLs.

Have questions about cyber security?

Let's reduce risk together

Contact us

42
entitlements to explore

Learn more about PUMA's Core, Core+, and Complete entitlements. Click one and learn how they work, why they are important, and their benefits.

Service Desk Core entitlements
Support For Your Staff

Service Desk Core

Supporting Your Technology

Service Desk Core

5 Ways We Support You

Service Desk Core

Access to Engineers

Service Desk Core

Fast SLA Guarantee

Service Desk Core

Asset & Inventory mgmt.

☂️ Meets cyber insurance

Account Management Team

Service Desk Core

Procurement & Sales

Service Desk Core

IT Strategy with vCIO

Service Desk Core

Identity Management

☂️ Meets cyber insurance

Security & LoB patching

☂️ Meets cyber insurance

Data Encryption Support

☂️ Meets cyber insurance

MFA Support

☂️ Meets cyber insurance

Vendor Management

☂️ Meets cyber insurance

Web traffic & Content Filter

☂️ Meets cyber insurance

NGAV - Virus License & Support

☂️ Meets cyber insurance

EDR & MDR license & Mgmt.

☂️ Meets cyber insurance

Security Baseline for Endpoints

☂️ Meets cyber insurance

PBX & Phone systems

Service Desk Core

Microsoft 365 Support

Service Desk Core

Network Support

Service Desk Core

License & SaaS mgmt.

Service Desk Core

ISP & Internet Mgmt.

Service Desk Core

Service Desk Core+ additional entitlements
Phishing Simulation

☂️ Meets cyber insurance

Vulnerability & Pen Testing

☂️ Meets cyber insurance

Security Awareness Training

☂️ Meets cyber insurance

DNS Advanced Filtration

☂️ Meets cyber insurance

Dark Web Filtration

☂️ Meets cyber insurance

Password Manager for Staff

☂️ Meets cyber insurance

HIPAA Platform & Mgmt.

☂️ Meets cyber insurance

Security Risk Assessment

☂️ Meets cyber insurance

Application Whitelisting

☂️ Meets cyber insurance

MDR + 24/7/365 SOC

☂️ Meets cyber insurance

Network Control

☂️ Meets cyber insurance

Ringfencing

☂️ Meets cyber insurance

Elevation Control (PAM)

☂️ Meets cyber insurance

Storage Control

☂️ Meets cyber insurance

Service Desk Complete
On site visits

Service Desk Complete

Unlimited Projects

Service Desk Complete