|Horizon Network Security
Is your network secure?
Our article in Communications of the ACM discusses what the NSA should have done
to protect its classified data against Snowden's theft of it:
Our CACM article on the NSA and Snowden
In today's more dangerous Internet, your Network Security
never has been more important. Horizon Network Security™ specializes
in inexpensive but effective mixed-platform Network Security
using Linux-based solutions so we have the expertise
to ensure that your network looks like Fort Knox or even
invisible to an intruder. Non-server systems can appear to
vanish from the Internet to prevent attacks, yet can have
access to as much of the Internet as your organization requires.
Our Linux security products and services
include the following:
All of these can be done by a single
low-cost, highly reliable, easy-to-maintain Horizon Network
system. We wrote the book
on Linux and network security. Let
us solve your security and Linux SysAdmin problems.
Our Linux security services do
NOT include the following:
you spend more on coffee than on IT security, you
will be hacked.
What's more, you deserve to be hacked."
-- White House cybersecurity adviser Richard Clarke
EFF's Guide to Protecting Electronic Devices and Data at the U.S. Border
While the U.S. Constitution prohibits unreasonable search
and seizure, traveling across the U.S. border may leave
your electronic devices vulnerable to searches by
government agents. Here's how to protect your digital data
at the border: