Expand all

The Risk

Once a corporate workstation and/or server, either virtual and/or physical is connected to the network, whether this network is directly connected to the Internet or not, it is susceptible to threats and attacks by unauthorized users.  This susceptibility raises the risk of sensitive corporate information ending up in the wrong hands and being used to the detriment of the organization’s interests.

Thus, the protection of both the network periphery from external threats and attacks as well as the internal resources from both external intruders but also internal malicious users, has become a priority for any organization’s security team.

To manage this risk, organizations have traditionally employed firewalls as their primary defense.  

A firewall acts as a gatekeeper either between the Internet and the organizational network or between different internal networks, blocking or permitting types of traffic based on the access control policy which is enforced, upon it. 

When appropriately selected, configured and managed, firewalls comprise a major part of the organization’s security infrastructure.

Protecting your Organization

Odyssey remains abreast of latest trend and technology developments in the area of firewall technologies.  We also maintain strong partnerships with long standing market leaders, which permit us to expand our knowledge and insights on these technologies.  We are therefore, in a position to provide you with best of breed, effective firewall solutions, which suit your specific needs and environment.

In doing so, our team will first assess your organization’s needs based on your existing infrastructure, network architecture, applications running and systems’ set up.  We will also ensure that we clearly understand your business objectives, internal policies and external compliance requirements as well as future expansion plans. Once we have a well-rounded understanding of your existing set up and business objectives, we will recommend the best-suited solutions for your needs.

The deployment phase is a critical part of this implementation process and requires your active involvement.  Your input ensures that the level of protection applied is in line with your risk appetite and that it maximizes control without hindering productivity.

Post deployment, is the steady state phase during which traffic patterns are observed and firewall policies are tweaked so that the effectiveness of the access control policy is optimized.



Doing it right: Our Firewall Solutions’ Key Features and Benefits

Our firewall solutions are largely characterized by the following key features and benefits:

Key Features


Ability to assign access permissions to network and systems

Increased protection profile in both physical and virtual systems and network environments

Alignment of firewall rules directly with organizational policy

Enables swift and effective deployment

A central management console allows for the easy and timely management and deployment/update of security policies

Centralized administration, reducing overhead and management costs

Graphical user interface for the monitoring of logs generated in real time for suspected events

Provides information pertinent in the timely identification of system attacks or miss-usage alerts

Enables the generation of reports needed for complying with internal audit and regulatory requirements

Simplified internal audit and regulatory reporting

Different deployment methods

Easy installation and deployment, bridge or in-line mode, without altering the organization’s existing network infrastructure if desirable


Remaining Secure – Support tailored to your needs

We very well understand that to remain effective, a security deployment requires constant monitoring, fine-tuning, updating and maintenance.  These requirements may prove a burden your organization is not poised to undertake.  We have, therefore, structured our post-deployment services so that you may have the level of support you need, in order to achieve maximum return on your investment, with the least of worries.

Our suite of post-deployment services range from simple Maintenance and Support, to full-fledged Managed Security & Outsourcing Services

This solution comprises part of the “Design & Implement” phase of our Information Security Continuum (D&I)