Hardware
Equip yourself with the brands that stand.
Desktops
Desktops and Workstations built to your specifications with onsite support.
Laptops
For the person on the move, we offer all leading brands of laptops and netbooks.
Servers
From entry-level to high-end, we can supply or build servers per to your specifications.
Hardware
IP Phones, Gateways/Routers, Peripherals, Graphic Cards, Gaming, Monitors, Consumables. We stock it all.
Support
Expert technical support available 24/7, when you need it the most.
Networks
Connecting through networking.
Auditing
We offer full network auditing on any size networking, with professional and in-depth reporting.
Cabling
We do all network configuration cabling including Fibre.
VPN
We also install and configure SOHO Networking for small business.
Networks
We can install and configure both wired and wireless networks.
Support
Expert technical support available 24/7, when you need it the most.
Cyber Security
Managing cyber security risks and the ever-changing threat landscape is a major challenge for Businesses today. Our RISK ASSESSMENT services are designed to help you proactively identity risks to your business-critical applications and improve your RISK posture to better protect your data and that of REDWILL ICT.
It is more than launching scans and finding vulnerabilities; it requires you to create processes around efficient remediation and to ensure that the most critical items are being fixed first. What you do with the data you uncover is more important than simply finding vulnerabilities.
Point solutions are a thing of the past – a modern security program is an ever-changing ecosystem of information and products working together to get smarter and improve each other’s ROI. Decodes dedicated integrations team ensures that Nexpose is a foundational source of intelligence to the rest of your security program. Find the most important vulnerabilities fast and address them immediately.
Understanding security risk on the global enterprise network is essential to comprehensive IT risk management. However, the high rate of change on enterprise networks, the constantly evolving threat environment, and increased focus on internal and regulatory compliance have made this task more difficult. Our leading vulnerability and security risk management system that enables organisations to cost-effectively measure and manage their security risk.
Vulnerability tests performed during a scan include assessing security testing of detected devices such as routers, firewalls, switches and load balancers; testing for weak passwords on common protocols such as FTP, IMAP, database servers, POP3, Socks, SSH and Telnet; Testing for DNS-related server vulnerabilities such as DNS zone transfer attacks, open recursive DNS attacks and DNS cache poisoning attacks; testing for badly configured Proxy Servers, weak SNMP community strings, weak TLS/SSL ciphers and many other security weaknesses.
iShield firewalls
Smart Access Unified Threat Management
iShield Home is a next-generation firewall that does deep-packet inspection including application level inspection and intrusion prevention/detection by utilising intelligence from outside of the firewall. The firewall is also referred to as a smart access Unified Threat Management (UTM) device that is located at your staff’s home, giving you the ability to remotely control your entire network via the Cloud.
- Protect your network
- Monitor your staff’s performance
- Block unproductive sites
- Report from anywhere, anytime