• Managed Firewall Security

    Have you considered the effects a sophisticated cyber-attack could have on your business? Experian’s third annual data breach preparedness study reveals a worrying lack of understanding among SMEs regarding the true cost of a data breach. UK Government figures indicate that a data breach costs SMEs an average of £310,000; yet the SMEs surveyed estimated the cost to be £179,990 – a shortfall of over £130,000.  In the US, the average cost for a Small Business averages $US36,000.00 and can reach well over $US50,000.00. One vital element to protecting against this is by installing a managed firewall at the edge of your network.

    The primary role of a firewall is to protect against hackers and malicious malware accessing your network and causing costly damage or interruptions. In order to do this, network security devices must be correctly configured, deployed and regularly upgraded to be aware of the latest threats.

    We offer a range of device models to suit any sized organization ranging from the small branch office, all the way up to medium and larger sized enterprises. Our technical experts carry industry certifications and bring years of experience in enterprise-class networks and security, meaning your network integrity is in safe hands with Computers & Controls.

    Using cutting-edge Cisco Meraki cloud managed security devices, Computers & Controls can deliver you a network security solution which does much more. Meraki MX devices are unified threat management (UTM) devices, meaning they offer a whole range of security features beyond the usual firewall services.

    Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access and costly breaches. Devices must be provisioned, deployed, upgraded and patched to keep up with the latest threats. Many organizations continue to be challenged by managing these solutions in-house, due to the heavy technical burden of day-to-day management or lack of available, skilled security expertise.

    Firewall management remains an organization’s primary network defense. It commands more time from network security managers than virtually any other activity and requires extensive experience to manage effectively

    It’s no longer enough to leave your security to auto-pilot. Security policies and configurations on your firewall devices must be updated to ensure appropriate access controls are consistent with changing business environments. Network firewall traffic must be monitored continuously to identify and respond to threats before damage is done.


    • Protect systems and data: 24×7 monitoring to alert you to threats before damage is done.
    • Remove the management and monitoring burden: free up resources and reduce overhead by leveraging our experts
    • Support compliance initiatives: meet requirements for perimeter security, access control and log analysis.

    Do you want to simplify your firewall management and increase your control and monitoring capabilities without adding capital expense or IT cost? Cisco Meraki Firewall was built specifically for modern, multi-use networks, providing extensive visibility and control over users, content, and applications. We can help you implement this technology to take advantage of the powerful tools it offers.

    Control Applications, Users, and Devices

    Layer 7 visibility is included in Cisco Meraki switches at no additional cost to automatically identify and report hundreds of applications, from business apps to BitTorrent and YouTube as well as apply firewall rules specific to each device. Network flow is categorized, and access control policies are enforced. Cisco Meraki’s next generation firewall controls evasive, encrypted, and peer-to-peer applications, like BitTorrent or Skype that cannot be controlled by traditional firewalls. The Cisco Meraki content filtering engine features native Active Directory integration to apply access controls specific to each class of users.

    Protect your network

    It’s no longer enough to simply block protocols, hosts, and ports – a firewall must also be user, content, and application aware. Featuring an integrated intrusion detection (IDS) engine based on Sourcefire’s Snort, Cisco Meraki’s security appliances protect your network against malicious entities and threats using a combination of signature, protocol and anomaly-based inspection methods. They can easily segregate voice, video, and data traffic, and deploy global firewall rules across VPN networks with a single click.

    Manage your firewall

    The Meraki cloud delivers seamless firmware and security signature updates and provides automatic network monitoring and alerts. Since the MX is managed entirely through the Cisco Meraki web-based dashboard, configuration, diagnostics and firmware updates can be performed remotely eliminating costly field visits. The Cisco Meraki MX is a complete networking and security solution designed to make distributed networks fast, secure, and easy to manage. Designed with intuitive controls, the MX requires no training or specialized staff. The MX will even self-provision, allowing for remote branch deployments without on-site IT.

  • Managed PBX and SIP

    These IP PBXs offer an advanced set of features with no licensing fees, upgrading fees or costs per features. Enjoy smooth and easy network integration. Support from 50 users all the way up to 2000 users.

    Enjoy the benefits of IP telephony without the complexity and high upfront Capital Expenditure (CapEx) with a fully-managed IP-PBX voice package.

    Bring about significant cost savings due to a lower cost of ownership and through paying a monthly Operating Expense (OpEx) instead of a high upfront CapEx.

    Evolve into the latest communication technologies without the hassle of managing or maintaining a customer owned PBX. Focus your resources and your team on key business initiatives instead of running a phone system.

    We can help you achieve a truly optimized telecom environment that’s tailored specifically to your company’s unique preferences, needs and goals.

    Moves and changes can be completed in a matter of minutes by calling our  Service Desk, staffed by real people and located in your “backyard”.


    • Managed IP PBX provides businesses with a premises-based, managed IP telephony solution.
    • Managed IP PBX architecture provides high availability and scalability.
    • help control the cost of your infrastructure and bandwidth
    • CPE-based managed IP PBX architecture provides a modular approach to VoIP and will support single and multiple sites
    • The user community interfaces to the IP PBX network via IP-phones or soft phones. Traditional analog sets are also supported through analog gateways.
    • Managed solutions frees users of any technical capacity, and therefore eliminates the stress of dealing with the hardware.
    • Managed Ip PBX offers all the equipment, software, operational facilities, hardware, and technical insights necessary to provide IP-enabled phone service As a result, the costs, risks, and technical savvy typically required are greatly reduced.
    • Managed solutions also provides maintenance services, which include remote fault monitoring, trained IT personal, and network surveillance.
  • Business Intelligence
    • Balance Score Card with Command Dashboard
    • Fraud Detection
    • Financial Consolidation and Reporting
    • Credit Scoring
    • CRM
    • Customer Churn
    • Data Warehousing/Mining
    • Strategic Information Systems Planning
    • Marketing Automation
    • Activity Based Costing
  • Office Applications

    We offer training and customization for many Microsoft Office Business Software & Applications including Microsoft Office, Microsoft SQL Server, Exchange and Share Point.

    Is your Office 365 complete?

    After the decision is made to move to the cloud with Office 365, the next step is determining how to backup and preserve critical business data as well as incorporate business-grade phone service.

    We can help with integrating backups, security and communication to provide a Worry-Free, enhanced experience. Supplement Office 365’s capabilities with additional email and data protection, added compliance, robust voice services and true peace of mind.

  • SIP Trunking

    SIP trunking is Voice over Internet Protocol (VoIP) and streaming media service based on the Session Initiation Protocol (SIP) by which Internet telephony service providers (ITSPs) deliver telephone services and unified communications to customers equipped with SIP-based private branch exchange (IP-PBX) and Unified Communications facilities. Most Unified Communications software applications provide voice, video, and other streaming media applications such as desktop sharing, web conferencing, and shared whiteboard.

    With SIP Trunking, you can routes calls over an internet connection, eliminating the need to deal with the phone company.

    We offer service reliability
    Leverage enterprise-grade centers to protect against local outages.

    Save or redirect capital
    Restore life to an existing phone system or save enough to justify a new phone system.

    Most newer phone systems are compatible with SIP Trunking with no extra equipment.

    Setup and installation
    We work to help with all setup and migration tasks.

  • Exchange Hosting

    The way business is done today, to meet users’ basic requirements, businesses require 24/7 email availability, complete mobile freedom, and technologies to protect against unprecedented levels of threat. This is why email is moving to the cloud: a cloud email provider can offer far more functionality, reliability and protection than you could affordably deliver on-premises.

  • Hosted PBX

    Hosted PBX is a service where the call platform and PBX features are hosted at the service provider location. The business end users connect via IP to the provider for voice service.

  • Monitoring

    Manage information technology from a business transaction perspective. We provide tools for tracking the flow of transactions across IT infrastructure, in addition to detection, alerting, and correction of unexpected changes in business or technical conditions. Get visibility into the flow of transactions across infrastructure tiers, including a dynamic mapping of the application topology.