Network Security

911 Emergency Service

We understand that downtime is expensive to your business and disruptive to your operation.  Give us a call so that we may get started right away and evaluate what is needed to get you back up and running.  We have the technical skills and experience to think on our feet and decide what resources we can pull together in order to get you operational as quickly as possible.

Your computer network is the most used, most relied upon, most critical asset for running your business..... but it is probably the least appreciated.

There are two types of computer networks in business today. Those that were designed and installed well by competent professionals, and those that were not.  Most likely your network falls into the second category because you are looking for help and reading this!  Most networks that we encounter are a product of evolution.  When you first set up a network, it was a simple matter of running some wire around from computer to computer until the lights started blinking.  You either installed your first network yourself, or gave a deserving kid an opportunity to earn some money and gain experience while on summer vacation.  Maybe it was your own kid or relative and nobody wants to criticize their work.  It all seemed simple enough, but then you started adding more computers and eventually a server to share files.  You added Internet and maybe some multi-user software, printers, and other devices.  At some point, you added a wireless router so that your employees could use their laptops, smartphones, and tablets.  Somehow it all magically worked,,,, until it didn't!  This was all great until things started slowing down.  Strange error messages started appearing on your screens, and some computers could not get reliably connected.  Data got corrupted and you started having some real problems.  You can see from the variety of types and colors of network cable lying around that different people have come through and expanded or repaired your network, spendng no more than what it takes to get by.   You lost track of what goes where and what is actually being used. Employees come and go and nobody today really knows exactly what you have or understands how it all works, nor do they care. Eventually something breaks and you find out that the company, or individual who installed your network is out of business, or grew up and moved on.  Now you have a mess and you want someone to come in and straighten it all out.  Yes, we have seen it all before.  It is time for a new network, this time professionally installed!

Guard Dog Security Server


The “Guard Dog Security Server” is a customized stand alone server, dedicated to analyzing all your network traffic, and actively responding to security threats. Security threats are quickly shut down by Guard Dog sending firewall commands to a Tomato / DD-WRT router to immediately cut off the threat.

The server itself is based on Security Onion, a well known Open Source NSM “Network Security Monitoring” program, that runs on a customized Linux operating system. We customized Security Onion by adding some of our own programming that draws the latest threat information from various sources and effectively creates an Active Intrusion Protection System.

Good network security has several layers of protection. The first level of protection is at the firewall. The firewall, such as in our Tomato Routers, filters out a lot of unwanted traffic. We developed an America Only Internet feature that will filter out all but American (or whatever list of countries you choose) Internet IP addresses. A well set up firewall is a good first layer of network security. The firewall basically determines with whom your network is willing to communicate.

The Guard Dog Server adds another layer of protection to your overall network security. A copy of all the traffic passing through your router is sent to Security Onion. Security Onion analyzes that traffic to ultimately decide whether there is a threat or not. If a threat is detected, Security Onion will generate an alert which, using some of our own custom programming, results in a rule being sent to the firewall on the Tomato Router. The rule which is generated by the alert basically says “Drop all traffic for the offending IP address and deny further communication.” The rule effectively shuts down hackers trying to break into your network before they can do any damage.

Guard Dog monitors both incoming and outgoing traffic. If, for example, one of your computers on the network is infected with a Malware program, Guard Dog will detect that it is trying to open up suspicious connections to outside servers. These suspicious connections may be to receive further instructions or downloads. Like a real life guard dog, Guard Dog is always looking for an intruder to chew on!

Security Onion consists of an integrated set of Open Source programs that, when used by someone with the right forensic skills, can answer a lot of questions about what an infected computer is trying to do, what information it is trying to steal, and who it is trying to send it to. Security Onion keeps a history of all your router traffic for a week or two. This stored traffic can recreate suspicious activity for analysis. Security Onion is great at detecting and analyzing threats and the damage they do. Our approach is to shut down threats before any damage can be done.

Once set up, Guard Dog Server can be maintained and monitored remotely by our staff. Our servers send Guard Dog daily updates so it will know about the latest security threats.

The Guard Dog Server runs on the combination of a Server and Tomato Router. The cost is around $3000 for a small office with a dozen or so users. For medium sized offices or heavy Internet traffic, we have a more powerful Server at a cost of $5,000, which includes installation.

We have many years of experience successfully installing networks for small and medium sized business all over Central Indiana.

Typically a network install is the beginning of a long relationship with our customers.  We take the care and time to plan and do the job right.  We do not compromise quality on something that will wind up being so critical to the running of your business.  We stick to well established wiring and installation standards and follow best practices, which will make your network reliable and easy to expand and maintain in the future.  The last thing we want is for a poorly installed network to come back and haunt us.

We know how to deal with Security Related Emergencies.

Has your system been hacked?  Is your Internet connection under attack?  Are your computers infected with a fast spreading virus?  Has someone taken over your server?  Do you need your system secured after an employee change?  These are all issues that we have dealt with in the past and know how to get under control.  We have the tools and experience necessary to figure out what is going on and find a solution.  We will repair the damages, find the source of the problem, and implement preventions to secure your systems.

America Only Internet - USB Drive for Tomato and DD-WRT Routers


Custom USB Stick Drive for Tomato and DD-WRT configured only allow IP traffic within USA

Price:  $50.00   Call [317] 507-5433 to Order.  Free Shipping within USA.

Take advantage of the USB port on your Tomato or DD-WRT Router by plugging in this programmed USB Stick Drive.

All you need to do is plug it in and enter three lines of code in your Tomato Admin Screen, which we can do for you, and you will elimate all traffic from outside the USA.

This is the best way to keep foreign hackers out of your network.  Please read Tom's blog article: America only Internet! A Radical but Practical Idea for Blocking Foreign Hackers at the Router.

Features:  *  Low Profile (does not stick out like sore thumb)

                  * USB 3.0 (take advantage of USB 3.0 port on NightHawk Routers)

                  * Protects both Wired and Wireless Users

                  * Both Inbound and Outbound Blocking

                  * Compatible with USB 2.0

                  * Can be turned on or off easily.

                  * Can be customized to include more countries.

We have the skills and tools to find and correct problems on your network.

We have the ability to perform a full analysis of your network and find out what is going on. We can find and correct connection problems due to bad cable, connectors, or electrical interfearance.  We analyze your network traffic to abnormalities, traffic restrictions, or signs of virus activity.  We make sure your network is secure from attackers and hackers and that your corporate and customer data is protected.  We often implement QOS or Quality of Service Policies to make sure that your Internet connection is shared in a way that nobody can hog all the Internet bandwidth.  We monitor your network remotely and are alerted whenever a problem arises.

Once a server is set up and installed on your network, it must be secured.

Server Security, especially for servers accessible through the Internet must have the proper security to keep them from getting hacked.  We take server security very seriously because we realize just how dangerous the world is.  It is a given fact that there will be attempts to hack into your server every hour of every day.  This is just the nature of the Internet and a properly setup and secure server will be prepared and protected from such attacks.  We utilize firewall security, user and file security, as well as intrusion detection to keep your servers secure.  Servers, and the software they run, must be constantly maintained and updated to protect against the latest security threat.  Server Security is something that should be set up and maintained by competent professionals like us.  We can set up your server and monitor and maintain it remotely keeping an ever watchful eye for problems.