top of page
Cyber Security Defense Strategy
We believe in an 'active-blocking' approach to cyber security, in this page we aim to show you what this looks like.
Consider this standard internet-facing application. In this topology traffic sourced from the internet crosses an internet router, then a firewall for inspection and address translation, then typically the request is handled on a load-balancer before being redirected to a node running the web service.
bottom of page