Liona Enterprises ensures the protection of information and information systems from unauthorized access, use, disclosure, disruption, and modification in order to provide confidentially, integrity and availability. Our team of security professionals help create, update and maintain a security program that secures your information assurance risks and controls are in balance. Our IT Security Services include Network and Communication Security.

Network Security

Network Security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network.

Network Security involves access authorization to data in a network. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.

Network Security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Network Security is involved in organizations, enterprises and other types of institutions. It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Liona Enterprises Network Security services include:

  • Network and perimeter security providing network and application layer firewall, web gateway security, email gateway security, two-factor authentication, network data leakage prevention, and network IDS/IPS.
  • Maintenance services including IP surveillance and unified Communications.
  • Non-personnel services including database management, working group, maintenance, expansion, and migration.
  • Asset management and equipment custodian
  • Information assurance management
  • IT planning, consulting and budgeting
  • CAD services

Communication Security

Crypto-Security

Encrypts data, rendering it unreadable until the data is decrypted. In Communications Security, controlling messages and data is key. This involves ensuring that no unauthorized source has the ability to acquire or even discover the message’s existence. But in the event that the message is intercepted by unauthorized sources, it should be in a form that is encrypted so that no information can be derived from it.

Emisson Security

Analyzes a certain system’s vulnerability to unauthorized access as a result of issues with electromagnetic signals from hardware.

Typically, Emission Security is applied to telecom systems, radio networks, cryptographic systems, or other similar communication installations.

EMSEC has developed over time as a critical part of protecting sensitive data in government or business operations.

Traffic-Flow Security

Uses various measures to hide the presence of messages across a communication medium, or to cloak messaging to prevent the observation of traffic levels across an IT infrastructure. Even in highly protected systems, it might still be possible for outsiders to ascertain the amount of traffic over a system at any given time.

The use of traffic-flow security tools makes it impossible for external observers to see whether traffic is changing in real time, or when any individual message goes from one location to another.

Transmission Security

Secures data transmissions from being infiltrated, exploited or intercepted by an individual, application or device.

TRANSEC secures data as it travels over a communication medium. It is generally implemented in military and government organization networks and devices, such as radar and radio communication equipment.

Data Classification Technical Assessment

The Liona Data Classification Technical Assessment provides
the following:

  • Current and ideal state of the customer’s data classification and data loss prevention program.
  • Insight into data aging, access patterns, and true data ownership based on these patterns.
  • Where sensitive data is being stored, what permissions surround this data, and who is accessing it.