Client Login
mimic it

Security

mimicIT's security model is an extension of our overall philosphy of command and control for your IT environment. Our security premise is simple and powerful: Stop the breach at the source, or prevent it from occurring at all.

At The Server

The Linux OS when set up properly, is a secure server environment that is extremely stable. When each of the services offered by a single server is compartmentalized through virtualization, the chance of a errant process or weakness causing the compromise of your entire network becomes zero.

Virtualization allows each of your services to be separated into individual machines, then run on a single physical piece of hardware. We then limit the type and amount of data that is allowed to flow through each machine.

The machine itself is limited and is ineffective as an attack vector as it is locked behind its own software firewall.

If one VM becomes compromised, this image is detected as flawed, and we are notified.

At The Client

Infections by malicious software depends on assumptions about the environment the bug will infect. A large number of threats can be neutralized by adjusting the permissions that a normal user has while using their computer from day to day.

The idea that you can limit your user significantly is now an idea that is being embraced as a model by most IT managers, but this was not so only a few years ago, when mimicIT pioneered the idea.

Anti-Virus software is usually more of a burden on system performance and uptime then some of the threats it is desigined to counteract. By stopping the initial infection through a series of permission modifications to the client, the client becomes immune to the effects of malware.

At The Network

Information awareness is the Keystone in mimicIT's strategy to secure your network at the source. This concept is also applied to the tools we use to achieve this goal, OpenSource software.

Our firewall system is designed around OpenSource software, allowing its source code to be verified and tested against threats from the outside. These threats are usually bugs in the software that allow attackers to compromise your security by exploiting these weaknesses.

With OpenSource software, hundreds of individuals have a vested interest and a passion for this particular code, and work tirelessly to update and secure their creation.

This collective authorship is an enhancement of the security of a product to be sure. By allowing source code to be known and verified by everyone, a more secure system will inevitably result.

Using closed source solutions result in a less secure environment. Companies with closed source software pay large amounts to people that have discovered flaws in their equipment, and usually push out updates for said bugs in their own time.

With OpenSource, a bug is posted and can be fixed immediately. No more hole.

Information awareness also means being able to understand the attacks as they happen. Using heuristic algorithms, we can easily monitor most types of attacks and mitigate their threat to a negligible existence. Log files of incidence are stored and can be reviewed as a broad matrix for forensic investigation and prosecution.

 
clear