The
Virtual Firewall
As a user logs
in through an IP address they pass through these 6 layers of security:
1. Penetration
of the physical router and firewall
2. Penetration through Windows Advanced Server (a secure operating
system)
3. Penetration of the internet connection firewall
4. Authentication of user name and password
5. Penetration of the FTI Virtual Firewall
6. Penetration through the FTI Security Profile
All of this
is done within seconds, but must be completed before your program
information can be accessed!
If a user does
not pass even one (1) of these levels, an alert process begins.
Even if a user could get through the first 4 layers, during an illegal
attempt to access the FTI Virtual Firewall, an email alert is immediately
sent to your system administrator and to us.
User information
is captured at every layer and stored at 3 specific points in time
during penetration of security layers and can be sent to the FBI
NIPC (National Infrastructure and Protection Center) if security
is breached. We have worked with the FBI for a number of years and
have been instrumental in locating unapproved users.
As an added
bonus, even more protection is provided for our clients because
confidential database information is accessed through a separate
secure connection.
In summary,
FTI Virtual Firewall combined with the FTI Security Profile offer
additional levels of security and performance that secure web servers
and encryption do not afford.
|