About the company
Is your network running as optimally fast as it should? Are your applications always available 24/7, no matter where, no matter when? Are your applications safe from hacking and modern malware? Can you secure company mobile devices? These are the types of challenges Milestone Systems helps IT teams overcome — with our highly experienced engineers and top-tier network appliances.
As a value-added integrator focused on enhancing & securing networks, Milestone serves IT clients in 4 main ways:
- Consulting on IT Projects that need thought leadership and subject-matter expertise around network security, web application security, and application availability
- Network Appliances for high application availability, security, acceleration, manageability, performance
- Training Classes in F5 Networks, Cisco IronPort, Juniper, FireEye, and Blue Coat technologies, as well as for other technical certifications
- Professional Services such as 7×24 support desk, installation & implementation, web app security, network assessments, Tech-on-Tap and Gap Coverage technical support.
Trends: network service and cyber attacks
We see the industry trending toward using more specialized contractors. For instance, our customers are asking us to provide someone to manage specific parts of their networks — but only as needed, which might be only 20% of a specialist’s time. Milestone can provide the “always on” service needed.
Our client gets the subject matter expert he needs, whenever he needs it, without having to pay for full time, or deal with sick time, vacations, overtime, or any of the other life events that cause interruptions.
Another major trend is that cyber attacks are getting easier – and therefore more common. 10 years ago, an effective attack could have been done only by highly skilled network security people. Now, just about anyone can Google enough hacking tools to do some damage. Solutions? Stronger, layered network security architecture. Milestone employs specialist engineers who know the tricks that attackers use – and, more importantly, know how to thwart them.
What’s keeping CIOs up at night in 2013?
DDoS attacks, securing mobile devices, remote identity management, regulatory pressure, threat profiling….the list goes on and we could write books about each topic! If you do business over the internet, probably the one of most concern at the moment is DDoS attacks, or Distributed Denial of Service attacks. Basically, it’s an orchestrated attack of queries timed to flood your server and keep it so busy that legitimate business cannot be done. What do your customers experience? They can’t do business on your site, get frustrated, if not angry, and go elsewhere – thinking that they don’t want to deal with your site again. Brand damage is not the only thing to worry about, though: the DDoS attackers are malicious and use the attack to mask what they’re really doing – that is, stealing proprietary data.
So what can be done?
- Hardware: There are data center firewalls that can handle millions of queries per second – so many that the flood doesn’t have the effect of a flood.
- Education: People must be educated that smart attackers attach “command and control” botnets to free emoticons, otherwise innocent PDF’s, adware, and such things as plug-ins for your browser.