BIS Network Security

Comprehensive Layered Network Security Protection

According to the 2015 Cyberthreat Defense Report, over 70% of businesses have reported falling victim to a successful cyberattack in the last 12 months. At BIS we take a comprehensive layered network security approach. Our solution employs multiple vendors security definitions. Our network security solutions will help to prevent security threats from infiltrating your network by scanning for vulnerabilities, filtering website traffic, tracking system changes and alerting if any threats are found.

Experience Our Network Security Solutions For Yourself

Our Network Security Solutions

BIS SIEM Compliance Management
BIS Firewall Security Management
BIS Vulnerability Scanning

Since 2009, security incidents have grown 66% year over year

CGMA Magazine

Open DNS - Network Security

Domain Name System (DNS) is what make the Internet user friendly. Basically, it’s an address book for websites. When you type the DNS Servers convert that name to an IP address that goes to a web server. Using the correct DNS Server with the proper filters can be a great way to keep threats from entering into your network.
OpenDNS is a service that we use as a layer of protection that prevents cyberattacks. While a firewall and antivirus react to attacks after they have launched, OpenDNS observes Internet infrastructure before attacks have launched preventing malicious Internet connections. By pointing your DNS traffic to OpenDNS, it will stop 50% to 98% more attacks than antivirus and firewalls.


Malware & Breach
Proactive Threat Intelligence
Comprehensive Web Filtering
Dynamic Reporting
Ability to Secure Any Device Anywhere

BIS SIEM Compliance Management

With new laws being passed every year, it is more important than ever that organizations meet regulations. From HIPAA to SOX, businesses are being audited for compliance on a regular basis. It can be difficult to pass if you don’t have certain measures in place.
With our BIS SIEM Compliance Management, you’ll be able to see who is attempting to access data or make changes. It will detect malicious activity by tracking and validating changes made in applications and the system. With this solution, you’ll be able to pass compliance audits including HIPAA, SOX, FISMA, PCI DSS, ISO 27001 and more.


Compliance Auditing
Active Directory, SQL & Exchange Logging
File Use Monitoring & Windows Server Change Logging

BIS Firewall Security Management

When it comes to your company’s data, you can never have too many protections in place. More and more viruses are being created daily with the objective of gaining access to you and your clients’ confidential information.
With our BIS Firewall Security Management, it will reduce the number of security threats by filtering network traffic. We integrate multiple security features into one solution to create a product that will prevent cyberattacks with web filtering and anti-virus, anti-spam and anti-spyware while managing bandwidth.


Intrusion Prevention & Web Filtering
Bandwidth Management
Multi-ISP Fail Over & Load Balancing
Anti-Virus, Anti-Spam & Anti-Spyware

BIS Vulnerability Scanning

The majority of security breaches could have been avoided if businesses had taken proactive measures. Unfortunately, most organizations don’t discover a potential threat until it’s too late. If they had been actively monitoring their network, they would have been able to find the threat and fix it.
BIS Vulnerability Scanning helps to prevent security attacks from occurring by detecting loopholes in your network. With our security solution, your network will be protected with monthly (unobtrusive) scans that will create a report of findings to show you potential security threats as well as any changes made to your firewall settings.


Report of Findings
Comprehensive List of Network Assets
Vulnerability Detection Including Expired Active Directories & Software Updates & Patching

See What Other Gulf Coast Businesses Are Saying About Us...

Download Resources

Understand the Anatomy of Attacks to Stay One Step Ahead
Firewalls and antivirus stop many attacks during several steps of the “kill chain,” but the velocity and volume of new attack tools and techniques enable some to go undetected for minutes or even months.

BIS Subject Matter Experts on Network Security

Brandon Spivey

Security Operations Manager

Elliott Shirley

Security Operations Engineer

Patrick Rhodes

Backup & Disaster Recovery Engineer

Experience Our Network Security Solutions for Yourself

Request Your Free Demo Today

Read our latest blogs


What is Advanced Threat Protection?

We’re continuing on with our Tuesday Tech Tip series on Email Security. Today we’re going to talk about Advanced Threat Protection. What is Advanced Threat Protection and how does it protect you? Stay tuned.

So we’re going to talk about Advanced Threat Protection as it pertains to email. Well, first off, this is another service that sits really kind of in front of and even behind, as it relates to sending emails from your email server. From an incoming standpoint, it is scanning every email that comes in. It’s checking it for spam, the IP address where the email is coming from, and also for spoofing and things like that which I will talk about later.

It also checks the links within the email body to say whether they are or are not malicious. Basically, if you thought of it, it clicked the link and saw that where it was going and was safe and there wasn’t any malicious code in it. It does the same thing for attachments. Also, it would allow for some form of encryption on your email.

One thing about encryption is that it’s very important and all of the compliances are requiring it but very few people do it. We have it set up very easily where you can do it manually by simply putting an @ symbol along with the word “secure” in the subject line. By doing this the email automatically goes secure.

Often we don’t think about the files we’re sending and how sensitive information is in that particular email. So you can also set it up to where it will scan the attachment as well as the body, making sure there are no Social Security numbers, credit card numbers, or driver’s license numbers. So you can set it up to where it automatically searches the body and the attachments for content that would be deemed personally identifiable information, and then it would automatically encrypt it.

There are a lot of ways that you can protect this but encryption is one of the very best ways as it relates to the outgoing email. If you have questions or if you’d like to talk about this again, I’ve been really on this email thing because we are seeing such an influx in our environment of people’s emails basically getting hacked, if you will, if you have questions, if you have concerns, if you’d like to discuss this more, I’m always here for you. Thank you for watching.

Read More »