Flagusa.gif (12791 bytes) Greenriv-lrg.jpg (10869 bytes)
 HIPPA Security

Dark Fiber MAN




Extra links


Home of Dark Fiber MAN, Defense In Depth (DID) andSecurity and Disaster Recovery.

GRC and Lageman.com have merged to form a multi state enterprise offering Security, systems integration services and Dark Fiber Metropolitan Area Networks. Check our Bandwidth Chart if your curious about what speeds are possible today using fiber optic networks.

We are a HIRE AMERICA FIRST company.

Read the Article on the Largest National Security Breach in the history of the US.

1226f2b.gif (27810 bytes)

"The world isn't run by weapons anymore, or energy, or money. It's run by ones and zeros--little bits of data--it's all electrons....There's a war out there, a world war. It's not about who has the most bullets. It's about who controls the information--what we see and hear, how we work, what we think. It's all about information." Lines from the character "Cosmos," in the movie Sneakers, MCA/Universal Pictures, 1992.

The motion picture Sneakers focused on computerized information as a valuable commodity and on the technological means to invade and steal that commodity. To many, the high-tech wizardry of the movie probably appears exotic; however, it is much more realistic than some assume.

Security is a process, not a product. It touches every aspect of an organization. Yet security is often an afterthought. Even worse, some organizations' idea of security is the firewall sitting at the network edge or the virus scanner integrated into the mail servers.

Wrong. Security is none of these things.

Security is an approach to allowing authorized access to resources. Resources can be a shared disk drive, a Web page, an FTP site or access to the central computing facility, back end accounting system or the front end to an E-Commerce site by people both inside the company and outside on the Internet. It should be obvious that with the wide variety of entry points into your network, a layered approach to network security is required a Defense In Depth (DID) approach.

Security begins and ends with people. Therefore, security products and processes need to get pushed as close to the user as possible. That means building security deeper into the network than is seen today.

Traditional network security takes the perspective of "What are we trying to protect?" and "Whom are we trying to protect it from?" If you do your planning, you know that the answers depend on the value of the data. But those two perspectives say nothing about what kind of access, and by whom, should be permitted.

ThreatLRG.jpg (7389 bytes)

Just as there are many elements to security, there are many ways to solve those issues. Network security is about using the right tool for the right job and applying defense in depth. A firewall is great to control network access, but very few reach up into the application area. Likewise, it is well known that hardening your perimeter keeps intruders out, but you're still vulnerable to inside attacks. Security controls should be applied based on what is needed to protect resources rather than on network topography. Greenriver Communications belives that a complete approach to security is a proper approach. Whether you are a small office or SOHO or a fortune 1000, we can provide you with Secure Business Solutions for Today's Challenges.


14131.jpg (31489 bytes)

Executive Briefs

papers.gif (2022 bytes)

White Papers

cust_serv.jpg (11320 bytes)

Products and Services

Computer.gif (7750 bytes)


contact_man.jpg (4101 bytes)

Do you need help? Complete a short form so that we can contact you directly.

Email06.gif (20906 bytes)

Email Sales Department

newsIcon.jpg (1600 bytes)

hacker Glossary

14132.gif (16105 bytes)

Search the Internet

cardb2.jpg (10832 bytes)

Frequently Asked Questions

Contact Information

GreenRiver Communications Inc.

DFW Texas


Jacksonville Fl



Copyright 2002. All rights reserved. Contact: GreenRiver Communications Inc.