Security - Virtual Firewall and the Security Profile
Copyright © 2002-2005 FTI Global (all rights reserved)

At FTI, we offer our clients six (6) layers of protection including the FTI Virtual Firewall and FTI Security Profile protection. This is almost twice as much as most other providers.

 

 

The Virtual Firewall

As a user logs in through an IP address they pass through these 6 layers of security:

1. Penetration of the physical router and firewall
2. Penetration through Windows Advanced Server (a secure operating system)
3. Penetration of the internet connection firewall
4. Authentication of user name and password
5. Penetration of the FTI Virtual Firewall
6. Penetration through the FTI Security Profile

All of this is done within seconds, but must be completed before your program information can be accessed!

If a user does not pass even one (1) of these levels, an alert process begins. Even if a user could get through the first 4 layers, during an illegal attempt to access the FTI Virtual Firewall, an email alert is immediately sent to your system administrator and to us.

User information is captured at every layer and stored at 3 specific points in time during penetration of security layers and can be sent to the FBI NIPC (National Infrastructure and Protection Center) if security is breached. We have worked with the FBI for a number of years and have been instrumental in locating unapproved users.

As an added bonus, even more protection is provided for our clients because confidential database information is accessed through a separate secure connection.

In summary, FTI Virtual Firewall combined with the FTI Security Profile offer additional levels of security and performance that secure web servers and encryption do not afford.