| Horizon Network Security
                  ™ Our most popular services:Hardening Linux servers against attack and security audits
		    Linux System Administration
 Is your network secure?                   Our article in Communications of the ACM discusses what the NSA should have done
		     to protect its classified data against Snowden's theft of it:
		     
 Our CACM article on the NSA and Snowden
 
                   In today's more dangerous Internet, your Network Security
                      never has been more important. Horizon Network Security™ specializes
                      in inexpensive but effective mixed-platform Network Security
                      using Linux-based solutions so we have the expertise
                      to ensure that your network looks like Fort Knox or even
                      invisible to an intruder. Non-server systems can appear to
                      vanish from the Internet to prevent attacks, yet can have
                      access to as much of the Internet as your organization requires.  Do NOT learn the need for good computer security the hard way as Target, Home Depot, the NSA (National Security Agency) and others had to!  Our Linux security products and services
                      include the following:
                    
                   All of these can be done by a single
                      low-cost, highly reliable, easy-to-maintain Horizon Network
                                  Security™ Linux-based
                      system. We wrote the book
                      on Linux and network security. Let
                      us solve your security and Linux SysAdmin problems. 
  
                         Our Linux security services do
                  NOT                  include the following:   "If
                              you spend more on coffee than on IT security, you
                              will be hacked. What's more, you deserve to be hacked."
 -- White House cybersecurity adviser Richard Clarke
 
 | 
		  
EFF's Guide to Protecting Electronic Devices and Data at the U.S. Border
			  
			    While the U.S. Constitution prohibits unreasonable search
			    and seizure, traveling across the U.S. border may leave
			    your electronic devices vulnerable to searches by
			    government agents. Here's how to protect your digital data
			    at the border:
                   
                  
                  
                  
                  
              
                
                  | Network Security Products |  
                  |  |  
                  |  |  
                  |  |  |