Security Solutions

With an extensive background in security, Continental Resources (ConRes) is able to address the key vulnerability areas associated with your data center and information23 technology environments. Collaboration with customers and the emergence of new threats has allowed us to recognize and address the most pressing IT security issues.

The following lists include the standard Professional Services (PS) offerings in the security solutions area; CLICK HERE for Mobile and BYOD Security offerings, CLICK HERE for Cloud Security offerings and others are also available, so please contact your ConRes account representative or PS solution manager with your special requirements.


ConRes offers best in class security solutions to safeguard your data and IT investments

Conres Top 3 Security Threats C-level eBook

Conres Top 3 Security Threats C-level Executivcs need to worry about – eBook

Conres Nullifying Cyber Threats eBook

eBook explaining modern cyber threats and actions that can be taken to nullify them

Next Generation Security Platform F5 PaloAlto

joint collaborative security platform from paloalto and F5

IBM Qradar/Mass360 Solution Brief

Solutions Brief on IBM Qradar the industries most indepth SIEM paired with MaaS360 the best software for mobile device management and SSO

Securing Cloud Initiatives Overview

Securing your cloud initiatives with best in class solutions from ConRes

Security Vulnerability Assessment Penetration Testing Overview

Security Vulnerability Assessment & Penetration Testing Services: Organizations should continually scan for and repair vulnerabilities or face the risk of being the next compromised victim.

Network Security

  • Security Assessments
  • Penetration Testing
  • External/Internal
  • Enterprise Anti-Virus Solutions
  • Network Admission Control (NAC)
  • Centralized Management/Reporting
  • Endpoint Security
  • Desktop/Server Security
  • Microsoft Active Directory
  • Remote Access
  • Threat Management
  • Firewalls
    • Server, Appliance, and Router Based
    • High Availability
    • VPN-Virtual Private Networking
    • Data Loss Prevention (DLP)

Intrusion Detection/Prevention

  • Network Based IDS/IPS
  • Host Based IPS
  • Authentication Services
  • Wireless IPS

VPN - Virtual Private Networking

  • Site to Site
  • Remote Access
  • SSO (Single Sign On)

Wireless Security

  • Security Assessments
  • Secure Connectivity
  • Encryption
  • Rogue AP Detection
  • Centralized Management
  • Guest Access

Desktop Security

  • Enterprise Anti-Virus Solutions
  • Spyware/Adware/Malware Solutions
  • Patch Management
  • Configuration Management
  • Application Management
  • Desktop Firewalls
  • Host Based IPS
  • “Day Zero” Threat Mitigation/Prevention
  • Data Loss Prevention (DLP)

Print Friendly and PDF

Follow Us →