Virtual Private Networks - VPN
Here at Gammacom, security is paramount. Protecting company data, customer data, communications and more. Simple password protection of your workstations and servers is not enough, although heavily recommended. In an age where inappropriate access to a network could lead to the end of a business, network security should be very high on any company's shedule of longevity.
Amongst other security methodology, virtual private networks are a 'must have' in today's computing environments. With more and more business operating from remote locations, salesmen on the road, employees working from home, and mobile devices communicating from anywhere, VPNs ensure that all access into your network is secured, encrypted and in some cases, checked for suspicious activity.
Gammacom offer a number of hardware, software and hybrid based VPN solutions to suit all manner of business security needs. From small, local office to office communications through to complex multi-point access solutions covering the globe. Talk to Gammacom today to discover how your business can enhance security and protect against the unwanted prying eyes.
Put simply, a Virtual Private Network, or VPN, is a group of computers networked together through the internet. Businesses use VPNs to connect remote locations, and individuals can use VPNs to get access to network resources when they're not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they're using an untrusted public network.
When you connect to a VPN, you usually launch a VPN client on your computer, log in with your credentials, and your computer exchanges trusted keys with a security device. Once both computers have verified each other as authentic, all of your communication is encrypted and secured from eavesdropping.
There are numerous ways in which VPNs can be used on a daily basis to secure communications. We have highlighted just a few so you can compare your activities and see whether your habits are exposing yourself, or worse, the company you are working for.
A number of business have a central office with various smaller offices in geographically seperated locations. These offices need to collaborate their data in order to run their normal operations. Many of these businesses will pass that data via email, or perhaps login via terminal services to inject data to the central location. Although the communications seem secure to the regular person, all of these methods have been compromised in one form or another and cannot be relied upon for security.
The Road Warrior
Traditionally the road warrior, or 'on-the-road' salesman, would go about his day collecting his orders and data on paper, returning to the office once daily or weekly to input his data. Now days, the road warrior has his laptop, tablet or mobile device in which the data is sent to the head office in real time. More often than not, the data is sent to a web interface, or worse, emailed to another person in the office to input the data.
The Home Worker
With the age of the internet, workers are working from home more than ever before. They can either take their work home and complete which ever task is neccessary and bring the work back the next day, or perhaps connect to the business and work remotely for days or weeks at a time.
In all of these cases (and more), users are exposing themselves, their data, company data and communications to anyone who has more than a little knowledge about how the internaet operates. Make sure your business isn't at risk of this exposure - install and use a VPN to ensure all your data and communication is secured.
Types of VPN
There are various types of VPN technology available. Hardware VPN devices, software based and hybrid solutions that combine hardware and software. With service providers now reaching into the market, there are a number of managed VPN solutions also available. Each has its advantages, but the real security lies in the VPN protocols used to secure the communications. In some cases, add-on services also increase the security - such as malware and virus detection on the wire.
In some countries there are laws governing the use of security solutions and in various cases, the law demands such usage. Make sure you are aware of the laws before installing a solutions (or deciding not to). You may land your business in hot water.
- Internet Protocol Security (IPsec) as initially developed by the Internet Engineering Task Force (IETF) for IPv6, which was required in all standards-compliant implementations of IPv6 before RFC 6434 made it only a recommendation. This standards-based security protocol is also widely used with IPv4 and the Layer 2 Tunneling Protocol. Its design meets most security goals: authentication, integrity, and confidentiality. IPsec uses encryption, encapsulating an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination.
- Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic (as it does in the OpenVPN project) or secure an individual connection. A number of vendors provide remote-access VPN capabilities through SSL. An SSL VPN can connect from locations where IPsec runs into trouble with Network Address Translation and firewall rules.
- Datagram Transport Layer Security (DTLS) - used in Cisco AnyConnect VPN and in OpenConnect VPN to solve the issues SSL/TLS has with tunneling over UDP.
- Microsoft Point-to-Point Encryption (MPPE) works with the Point-to-Point Tunneling Protocol and in several compatible implementations on other platforms. This is not a recommended protocol as it has been severely compromised through-out time.
- Microsoft Secure Socket Tunneling Protocol (SSTP) tunnels Point-to-Point Protocol (PPP) or Layer 2 Tunneling Protocol traffic through an SSL 3.0 channel. (SSTP was introduced in Windows Server 2008 and in Windows Vista Service Pack 1.)
- Multi Path Virtual Private Network (MPVPN). Ragula Systems Development Company owns the registered trademark "MPVPN".
- Secure Shell (SSH) VPN - OpenSSH offers VPN tunneling (distinct from port forwarding) to secure remote connections to a network or to inter-network links. OpenSSH server provides a limited number of concurrent tunnels. The VPN feature itself does not support personal authentication.
Anti-Malware and Anti-Spyware Features
Using a VPN doesn't mean you're completely invulnerable. You should still make sure you're using HTTPS whenever possible, and you should still be careful about what you download. Some VPN service providers, especially mobile solutions, bundle their clients with anti-malware scanners to make sure you're not downloading viruses or trojans. When you're shopping, see if the providers you're interested in offer anti-malware protection while you're connected. There are a number of in-house solutions that also provide great scanning and blocking capabilities - usually tied up in hybrid solutions.
Advanced Application Delivery Solutions
AADS is a terminal services add-on program that runs on the Windows operating system. It can be installed on most reasonable quality desktop PCs or very high-end servers. Once installed and configured, AADS enables high quality remote access for an unlimited number of users. Its low cost and scale-ability allow it to be of immense use in a range of business environments from a few PCs with a peer to peer network to corporate networks with hundreds of users.
Any organization that uses Microsoft Windows and is considering, for whatever reason, to use Microsoft Terminal Server solutions, should consider AADS first, because it is easier and cheaper to deploy, but mostly because of the easy and relaxed license terms.
Advanced Application Delivery Solutions enables you to deliver Applications to all your users:
- Multiple concurrent remote desktop sessions.
- Scalable performance, using the Load Balancing of the Farm functionality.
- Application Control and Publishing. Give your users only the applications they need.
- Seamless Windows & Desktops.
- Integrated web server for an online desktop portal using browser access.
- Small version and Enterprise version available.
- Integrated SSL Gateway for a secured connection, everywhere in the world.
- Windows 7 Professional, Enterprise and Ultimate, Windows 8 Professional and Enterprise, Windows XP Pro SP2 or higher, Vista Business and Ultimate.
- Server 2003, Standard, Enterprise and Small Business Server, Server 2008, including Small Business Server 2008, SBS 2008-R2, SBS 2011, Server 2012 including 2012 Essentials.
- Builtin Postscript / PDF printer.
- Runs on 32 and 64 bit versions of Windows.
- One license per server. One fixed price per server. No hidden fees or charges.
The actual maximum number of users is only limited by your own infrastructure.
1 or more AADS Servers
Multiple clients running Windows, OSX, Linux or Thin Client devices
A mail server can be inundated with some 250000 unsolicited emails in a single weekly period. Our Antispam solutions can stop you from being the next target and defend your business from unwanted spam and time wastage.
The large majority of anti-spam solutions check for spam once the email has downloaded into the mail system. Once downloaded a Bayesian search of known spam attributes is conducted which identifies suspicious email as spam and the file is labeled and stored to be dealt with at a later date. Our product will stop 80% of the spam from downloading to your system entirely, hence removing 80% of the risk at the perimeter.
Few people realize that unsolicited emails won't just occupy hard disc space, but also consume precious internet bandwidth!
You pay for the inconvenience of downloading spam; The more there is, the more you pay. In addition, it is suggested that spam can take up to one minute of an employees time to deal with each spam message - calculate that over a year and you are looking at hundreds of dollars of wasted man hours within your business.
There are numerous anti-spam solutions available on the market. Most automated solutions suffer some generic disadvantage; They all require a degree of user management and they all block legitimate emails when you least expect. Our solution has a proven track record of blocking the least amount of legitimate email.
Gammacom has assessed the effectiveness and costs of various spam filters available and has chosen the best solution called ASSP. The advantages we have identified with this program when configured correctly are:
- Blocking unsolicited email before it is downloaded onto the system mail exchange provides for a much cleaner and more stable exchange. You save money because you use less bandwidth and the system runs faster because it has less clutter to deal with. Other solutions download the complete message before dealing with it.
- It has a delaying feature which most other offerings do not. Spammers generally operate by hitting an address and gauging the response. When receipt of the email is delayed, the response is delayed, and thus the spammer thinks that the address is invalid and moves on to the next hit on the list. This one feature blocks 70% of spam.
- If the email is genuine the sending server will usually try again after a few moments and the email is then accepted. The down side of this function is that genuine email is no longer instant but will take four minutes to be received.
- External Blacklisting is optional (yet recommended). Black lists are usually maintained by a third party and is reactive rather than proactive. By the time the spammer's address is on the black list, the spammer has moved on and is using another address to send from.
- No licenses per user to pay for. No ongoing subscriptions or fees.
- Self maintaining automatic updates run on schedule.
- ASSP has an auto-learning capacity. Spammers are constantly changing their strategies in much the same way that the creators of virus programs are constantly changing their strategies. ASSP has the ability subject to (some minimal ongoing configuration) remain current.
- Full Antivirus email and attachment checking and removal with a vault from which to regain access to incorrectly identified attachments when required.
- Functional white list which is developed by identifying the company's mail contacts and adding to them to the list over time.
- Simple to use email vault to retrieve falsely identified spam.
- Little user intervention and great user control.
Talk to us to find out how we can minimize your email and spam costs whilst maximizing your communications efficiency.
Secure sensitive data transmission on your website. Personal details, customer orders and more can all be protected with up to 256 bit encryption.
SSL stands for Secure Socket Layer, securing the transfer of sensitive data such as credit card or login information between a web browser and a server. Having an SSL certificate enables the data to be encrypted so that it can only be read by the authorised server - even if the encrypted data is intercepted, it is unreadable. Displaying the certificate delivers peace of mind to you and your customers, certifying that yours is a legitimate and secure site.
You may already have a shared SSL certificate included in your Gammacom hosting package. However, this certificate will always show Gammacom as the owner. An SSL certificate will show your company as the owner of the security on your site. Increase your brand presence and improve your customers' trust in you.
GeoTrust issues Gammacom's SSL certificates. GeoTrust is one of the largest providers of SSL certificates in the marketplace and it is a widely recognised and trusted brand.
Free GeoTrust site seal
Receive one of the most recognised security trusted marks on the internet. Click to verify domain, company name and location.
Our 256-bit encryption enable each site visitor to experience the strongest SSL encryption available to them.
Receive unlimited server licenses and unlimited free reissues during certificate lifetime
The SSL Certificate supports for more than 99% of browsers and most mobile devices.
Unlimited 24x7 Support
Our dedicated support team is based in Australia and available 24x7. We're well qualified and highly experienced to handle all requirements.
Order your QuickSSL Premium certificate for only $150 today.
Getting online can be daunting, and at Gammacom, we have everything you need to get started. No frills, just reliable web hosting, simple domain registration and excellent service. Gammacom is backed by Australia's largest domain registrar, utilising world-class hosting infrastructure. Rest assured that your personal or business website is safe and secure with us.
Domain Name Registration
The first step to setting up an online business is securing the right domain name for your business. You need to choose a domain with a good keyword, so people can find and remember you, and choose the best domain extension for your business. Once you know what domain your business needs, it's quick and easy to register it with the right domain provider.
With Gammacom your domain registration is complete with great value prices and superior service and support.
Click Here for our domain registration pricing.
Transferring your domain names to Gammacom is quick and simple, and means you can consolidate any or all of your current domain names into one account, with the powerful management features provided by TheConsole, plus great future savings on domain name renewal costs.
To get started, just enter a domain name and the domain password for the domain you wish to transfer and click 'Transfer'. You will be able to add more domain names to your transfer list on the next page.
Click here to transfer your domain today.
Don't let your domain name fall into somebody else's hands. Click Here to renew your domain today.
Keep your domain contact details private and hide them from public view.
Click Here to secure your domain details today.
Manage domain redirection, zones, MX records, A records and sub-domains. Click Here to purchase the Domain Manager now.
- URL redirection
- Zone management
- Alias email account
|.com.au||79.00 (2yr only)*|
|.net.au||79.00 (2yr only)*|
|.org.au||39.00 (2yr only)*|
|.asn.au||69.00 (2yr only)*|
|.id.au||35.00 (2yr only)*|
*Australian domain regulator AuDA stipulate that it is compulsory that these domains must be registered for a minimum of 2 years.
Domain Names & Web Hosting
Getting online can be daunting, and at Gammacom, we have everything you need to get started. No frills, just reliable web hosting, simple domain registration and excellent service.
Gammacom is backed by Australia's largest domain registrar, utilising world-class hosting infrastructure. Rest assured that your personal or business website is safe and secure with us.
Powerful server technology brings Gammacom's experience building and operating public clouds to customers running the server platforms. We can help you deliver and manage a cost-effective IT infrastructure–both physical and virtual. Gammacom provide a modern, open application platform for both today’s software applications and tomorrow’s hybrid cloud solutions. Helping provide your users with access from almost anywhere and any device, giving them the flexibility to stay productive while on the go.
Virtualizing your server hardware improves both scalability and performance. It helps you deliver a fully-isolated, multitenant environment that includes tools to help guarantee nearly 100% uptime. With Gammacom server technology you can continually increase your VM density without additional costs for virtualizing infrastructure and applications.
You can also virtualize your networks and enable software-defined networking. This provides the flexibility to move networks freely within your business environment or to a hosting provider without reconfiguration. It also provides network isolation among the VMs running on different virtual networks, enabling multitenant environments.
Gammacom provides new storage scenarios which offer high availability on industry-standard server hardware. Make the most of your storage by thin-provisioning and trimming VM storage, pooling diverse storage resources, and abstracting them for flexible usage throughout your environment. Use file servers as file-based network storage for application data—now with the high levels of performance and reliability those scenarios require.
Modern App Platform
Gammacom servers are broad, scalable, and elastic platforms that gives you the flexibility to build, deploy, and manage applications and websites on-premises, in the cloud, or in a hybrid environment, using a consistent set of tools and frameworks.
Programming consistency and common development tools can help ease the transition to the cloud, while enabling hybrid applications across on-premises and service providers.
Gammacom servers provide frameworks, services, and tools to help increase scalability and elasticity for applications that support multitenancy, and improve website density and efficiency. This both benefits IT professionals in traditional datacenters and also helps service providers to more effectively build, provision, and manage hosting environments.
We offers enhanced support for open frameworks, open source applications, and development languages. Web standards, PHP, and node.js are supported, while .NET Framework 4.5 offers features and improvements such as support for asynchronous file operations, web, and networking enhancements.
The modern workstyle is defined by flexibility in how and where users access their data and applications. Centralized desktops and remote access solutions have been made easier to deploy and to manage, providing an easier way to give users more secure access to corporate infrastructure.
Gammacom servers enable a personalized, rich user experience from many more devices while adapting to different network conditions quickly and responsively. Remote users can change locations or devices while maintaining an experience close to that of a laptop or PC, enabling them to maintain their productivity.
Contact us to find out how Gammacom can assist your business with server provisioning, installations and maintenance.
With Gammacom as your phone systems provider, you can be assured of the latest telephone system solutions available for your business. With the ability to integrate your entire phone system into your current network infrastructure, phone system changes are now quick and easy to do. This allows you to focus your valuable time towards your business, reducing management costs and creating more efficient communication with your employees, vendors, and customers. Let Gammacom become your expert team and show you why we are a premier phone systems provider.
As a top phone systems provider, Gammacom utilize the latest in VoIP technology with leading vendors in the industry. You will no longer have to call a telephone company out every time you want to move a phone extension or add a new employee to the company directory; we can provide these services remotely which saves time and money.
Advantages of using Gammacom to provide your phone system requirements:
- Lower Monthly Costs
- Streamlined Management
- Voicemail to E-mail Integration
- Music On Hold
- Call Center Solutions
- Find Me, Follow Me
Are your servers stuck in a corner somewhere, an eyesore for anyone that happens to walk by? Gammacom can straighten out the wiring and nest of cables that are currently found in your "server room" and create a more efficient and physically secure environment for all of your infrastructure hardware. Physical security is one of the most often overlooked risks in a company's network. A knowledgeable cabling company, like Gamamcom, can design a solution for you that will be aesthetically pleasing while still providing the required accessibility needed for your environment.
Structured cabling provides a foundation which an overall network strategy is built upon. Strategic planning ahead of time with Gammacom can save you a lot of headaches in the future with regards to moving, changes, rearrangements, and upgrades. We will ensure you have a network capable of sustaining current and future bandwidth loads.
From initial needs assessment, network cabling design, and project management to final delivery, Gammacom will be by your side to ensure your next cabling project is completed in time and on budget with professionalism, and meticulous attention to detail.
Work with a dedicated team of professionals to help you identify the variables of the space being cabled. Devise a detailed plan based on industry proven best practices and years of experience is for optimal office cabling, furniture placement, server room cabling, wireless device cabling and electrical requirements. We’ll help you evaluate all the elements, such as server room location, cable type, building codes, and more. Gammacom will outline a personalised network cabling system, structured and tailored to fit your businesses individual needs. At every step, we go the extra mile to ensure your cabling will not only be efficient and reliable, but aesthetically pleasing as well.
- Supply, installation and testing of structured cabling systems
- Testing and certification to current standards and requirements
- Network room and cabinet design and installation
- Data centre design and installation
- Patch Leads, audio/ visual cables and accessories
- Refurbishments and upgrades
- Additional outlets
- Physical security
- Expert technicians
- Constant support
Looking for a new computer? Look no more...Gammacom can supply all makes and models of computers from IBM, Dell & HP, amongst others. We have great deals available on all hardware, even upgrades on current models. Talk to us today to arrange a quote that will beat all the big retailers and save your hard earned dollars for more important things like new golf clubs or a new dress!
Even better - why not try a generic custom PC? You can specify all the requirements, we'll find all the best gear and you get the lowest price. Gammacom boast Computer packages for as low as $700 all inclusive. See our Computer Packages Page for further information.
Talk to us about your needs and let us recommend a tailored PC to suit your needs exactly.
|Dell PCs||Generic Custom PCs||HP PCs|
Plastic Card Solutions
Plastic Card Solutions
Smart cards, proximity cards, security and RFID cards are available for many different applications such as access control, e-purse, transit ticketing, device usage and cost control, and identification. Amongst similar applications, cards come in a number of brands, formats and configurations.
With the right information, Gammacom can provide a competitive supply of cards to suit most applications, both in plain and pre-printed designs.
Common card formats such as Mifare 1K and 4K, HID Prox, Duo Prox, Indala, Motorola and other popular formats are available for fast delivery.
Delivery of smart and proximity cards is subject to delays in customisation of security codes, pre-printing or personalisation.
Prox | RFID | Access Cards
Gammacom provide a full range of brand and styles of contactless smart, RF and Access control cards.
Contact Chip Card
Contact Chip cards come in a variety of compatibilities and capacities. With precise information about the cards you need, Gammacom can provide your card solution.
Mifare 1K S50
The Mifare S50 is one of the world’s most popular contactless smart cards. Gammacom keep the Mifare S50 1K cards in stock in a high quality laminated printable white stock at competitive prices.
Family Mifare Cards come in a range of models including:
- MIFARE Ultralight/ C
- MIFARE Classic
- MIFARE Plus
- MIFARE DESFire/EV1
Pricing on application. Seasonally variable, depending on volume.
- Article Count: