ChaseTek – Telecom Advisors

Chasetek pic
Chasetek
Image: Chasetek.com

Michael Marlowe serves as ChaseTek’s director of strategy and vice president of new markets. In his over two decades of experience Michael Marlowe has been employed at several large organizations, operated as the principal consultant for an innovation assessment for the City of Columbus, OH, and is an experienced telecom advisor

ChaseTek was established in 2004 with the mission of designing, acquiring, implementing, and managing infrastructure for the use of various technologies in a comprehensive manner. Specializing in not only voice and data networks such as telephone services and the Internet, but also help desk and vendor management, ChaseTek maintains a commitment to providing advanced system analysis and ensuring personalized maintenance and management support so that it can continuously deliver effective solutions to its clients.

Headquartered in Dublin, Ohio, ChaseTek operates in over 9,000 domestic and international locations and serves more than 1,900 brands. To learn more about ChaseTek, visit www.chasetek.com.

Advertisements

A Primer on Firewalls

 

Firewalls pic
Firewalls
Image: cisco.com

A strategy executive with experience in finance and telecommunications, Michael Marlowe serves as the director of strategy and vice president of new markets with ChaseTek in Columbus, OH. In his leadership role with the Columbus, OH-based firm, Michael Marlowe serves as a point of contact for services such as VoIP, landline, and firewall management.

In today’s tech-centered world, nearly all telecommunications companies offer some kind of firewall management service. At the most basic level, a firewall refers to a method of filtering incoming and outgoing Internet traffic with the purpose of ensuring network security. The ideal firewall should allow all legitimate traffic through while preventing unwanted traffic that may be harmful to the user’s system.

Firewalls achieve network security in a number of ways. Simple firewalls examine information for characteristics such as its source and location, which can give clues regarding its legitimacy. While these types of firewalls are great at preventing unwanted data from coming in, they do little to prevent unwanted outgoing data from “Trojan horse” viruses. To prevent these malicious programs from transmitting user data, complex software firewalls can be used alongside a hardware firewall.