Layered Network Security

Unified Threat Management & Umbrella DNS Protection

Layered network security is a security measure that applies multiple levels of security to protect data and networks from unauthorized access. The layered approach adds an extra level of protection by making it more difficult for attackers to penetrate the network.

By using multiple layers of security, QuantaSi offers a unified threat management solution that is tailored to the specific needs of their customers.

By combining the best features of both traditional perimeter security and next-generation firewalls, layered network security provides a comprehensive approach to protecting data and networks, including unified threat management and umbrella DNS protection.

DNS Protection – Cisco Umbrella

Umbrella provides end customers with on- and off-network protection from cyberattacks, such as malware, phishing and command and control callbacks. By leveraging DNS, Umbrella makes it fast and easy to proactively enforce your policies and gain full visibility into your entire customer base.

Because Umbrella is cloud-delivered, there is no hardware to install or software to maintain.

Enforce protection and policy compliance for laptops that leave the network, so you can enforce security anywhere with no added latency.

Umbrella enables you to efficiently protect and manage your organization in groups instead of just one at a time, which helps you reduce the time spent reacting to malware.

MULTIFACTOR AUTHENTICATION (MFA) – CISCO DUO

Proactively reduce the risk of a data breach with Duo. Verify users’ identities, gain visibility into every device and enforce adaptive policies to secure access to every application.

Duo is a cloud-based software service that provides customers additional layers of security designed to protect access to proprietary and third-party applications. Most applications only require a username and password prior to allowing a user to log-in.

When protected with Duo, the username and password will first be
verified on the customer/application side (or with the assistance of Duo-hosted SSO, depending on customer’s settings) before triggering Duo’s two-factor workflow by requiring the user to take additional action before the login process can be completed (e.g. confirming login via Duo’s mobile app, SMS, phone call or hardware token).

Customers can further check the security hygiene of user devices before granting access and block, notify or restrict access for users with risky devices. Duo also allows customers to control which internal applications are accessible by different groups of users to limit exposure to sensitive information and enforce policies at an application level.