{"id":814,"date":"2025-06-17T13:14:21","date_gmt":"2025-06-17T13:14:21","guid":{"rendered":"https:\/\/staging.mintcreative.com\/ideal-test\/?page_id=814"},"modified":"2025-07-18T11:01:06","modified_gmt":"2025-07-18T11:01:06","slug":"local-network-security","status":"publish","type":"page","link":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/local-network-security\/","title":{"rendered":"Local Network Security"},"content":{"rendered":"\n<!-- \/\/ Hero section -->\n<section class=\"secondary-hero secondary-hero--minimal\">\n    <div class=\"container\">\n        <div class=\"row position-relative\">\n            <div class=\"hero-content col-lg-8 offset-lg-2 text-center\">\n                <h1 class=\"secondary-hero__heading h1 text-gradient\">\n                    Local Network Security                <\/h1>\n\n                                    <h2 class=\"secondary-hero__subheading h2\">\n                        Protecting your network from cyber attack                    <\/h2>\n                \n                                    <p class=\"secondary-hero__text p-intro mb-0\">\n                        Having an architecture that offers the ability to control network connectivity for devices and limit their access within network infrastructure is essential to maintaining secure network infrastructure. We can help you to develop your network security, effectively utilising segmentation, Trustsec, Network Access Control (NAC) and enhanced wireless security to protect your infrastructure.                      <\/p>\n                \n                                    <div id=\"contact-trigger\" class=\"secondary-hero__btn z-0 btn-wrapper\" data-bs-toggle=\"modal\" data-bs-target=\"#contactModal\" data-subject=\"Local Network Security enquiry\">\n                        <span class=\"btn btn-color\">\n                            Book a Cyber Security Assessment                        <\/span>\n                        <div class=\"btn-extension\">\n                            <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/themes\/ideal\/images\/_splide-right-arrow.png\" alt=\"\">\n                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"split-text\" id=\"expertise\">\n    <div class=\"container\">\n        <div class=\"inner-pad\">\n\n                            <div class=\"row\">\n                    <div class=\"col-12 col-xl-6\">\n                        <h2 class=\"split-text__heading h1 text-gradient\">\n                            Balancing protection and network access                        <\/h2>\n                    <\/div>\n                <\/div>\n            \n            <div class=\"row\">\n                <div class=\"col-12 col-xl-6\">\n                    <div class=\"split-text__left position-relative top-0\">\n                        <p class=\"p-intro\">Your objective is simple. You need to repel malicious actors from your network without slowing down or compromising access for legitimate users.<\/p>\n                    <\/div>\n                <\/div>\n                <div class=\"col-12 col-xl-6\">\n                    <div class=\"split-text__right\">\n                        <p>Achieving that can be complex. We can work with your team to take a holistic view or target specific vulnerabilities you need to fix fast.<\/p>\n<p><span class=\"TextRun SCXW254474055 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW254474055 BCX0\">We\u2019ll<\/span><span class=\"NormalTextRun SCXW254474055 BCX0\"> implement the latest local network security technology alongside robust processes and compliant policies. The aim is to create resilient local network <\/span><span class=\"NormalTextRun SCXW254474055 BCX0\">security<\/span><span class=\"NormalTextRun SCXW254474055 BCX0\"> that can help you to detect malicious cyber activity and protect your wider network environment.<\/span><\/span><span class=\"EOP SCXW254474055 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n                    <\/div>\n                <\/div>\n            <\/div>\n\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"banner-image banner-image--s3\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"position-relative\">\n                    <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/Local-Network_Top_IDEALREFRESH136-scaled-e1750931415141.jpg\" alt=\"Banner Image\" class=\"img-fluid w-100\">\n                                            <span class=\"banner-image__info col-6\">Protection at Every Level<\/span>\n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"split-text\" id=\"expertise\">\n    <div class=\"container\">\n        <div class=\"inner-pad\">\n\n            \n            <div class=\"row\">\n                <div class=\"col-12 col-xl-6\">\n                    <div class=\"split-text__left position-sticky\">\n                        <p class=\"p-intro\">We can support you with:<\/p>\n                    <\/div>\n                <\/div>\n                <div class=\"col-12 col-xl-6\">\n                    <div class=\"split-text__right\">\n                        <ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Network segmentation,<\/span><\/b><span data-contrast=\"auto\"> including implementation of virtual networks for traffic segmentation\/micro segmentation, Trustsec (SGT), ACLs, and other controls to restrict traffic between network segments<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Network Access Control,<\/span><\/b><span data-contrast=\"auto\"> utilising Cisco Identity Security Engine (ISE) to manage access and authentication, policy enforcement, contextual awareness, and device profiling<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Wireless Network Security<\/span><\/b><span data-contrast=\"auto\">,<\/span> <span data-contrast=\"auto\">protecting your wireless access points and controllers and introducing encryption and authentication mechanisms for Wi-Fi networks<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Network Infrastructure Security Audit<\/span><\/b><span data-contrast=\"auto\">, reviewing the design, configuration, management, and compliance of your network infrastructure devices and providing a report with prioritised risks, issues and suggested remediations<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n                    <\/div>\n                <\/div>\n            <\/div>\n\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"icon-boxes\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col-12\">\n                <h2 class=\"text-gradient\">With Ideal, you can expect:<\/h2>\n            <\/div>\n        <\/div>\n        <div class=\"row\">\n                            <div class=\"col-12 col-lg-4\">\n                    <div class=\"icon-box\">\n                        <div class=\"icon-box__icon\">\n                            <img decoding=\"async\" width=\"53\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/design-icon.png\" alt=\"\">\n                        <\/div>\n                        <div class=\"icon-box__details\">\n                            <h3>Expert design<\/h3>\n                            <p>With tailored solutions based on your vulnerabilities, legacy technology and user activity.<\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"col-12 col-lg-4\">\n                    <div class=\"icon-box\">\n                        <div class=\"icon-box__icon\">\n                            <img decoding=\"async\" width=\"53\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/installation-icon.png\" alt=\"\">\n                        <\/div>\n                        <div class=\"icon-box__details\">\n                            <h3>Smooth delivery<\/h3>\n                            <p>Working alongside your team to expertly configure, test and deploy technologies, policies and protocols.<\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"col-12 col-lg-4\">\n                    <div class=\"icon-box\">\n                        <div class=\"icon-box__icon\">\n                            <img decoding=\"async\" width=\"53\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/support-icon.png\" alt=\"\">\n                        <\/div>\n                        <div class=\"icon-box__details\">\n                            <h3>Dependable support<\/h3>\n                            <p>Monitoring and reviewing effectiveness and providing UK-based <a href=\"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/managed-services\/\">Managed Service Support<\/a>\u00a0 going forward.<\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"cta-block\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"cta-block__inner\">\n                    <div class=\"cta-block__left-col\">\n                        <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/themes\/ideal\/images\/_support-icon-lg.png\" alt=\"\" width=\"289\" class=\"img-fluid\" \/>\n                    <\/div>\n                    <div class=\"cta-block__right-col\">\n                        <h3>How can we help?<\/h3>\n                        <h2>Book a Cyber Security Assessment<\/h2>\n                        <p class=\"p-intro\">To book a Cyber Security Assessment or consult with one of our Cyber experts, fill in the form and we\u2019ll get right back to you.<\/p>\n\n                                                    <div id=\"contact-trigger\" class=\"btn-wrapper\" data-bs-toggle=\"modal\" data-bs-target=\"#contactModal\" style=\"cursor: pointer;\" data-subject=\"\">\n                                <span class=\"btn-color btn-color--reverse d-inline-block text-center\">\n                                    <span class=\"text-gradient\">Book a Cyber Security Assessment<\/span>\n                                <\/span>\n                                <div class=\"btn-extension\">\n                                    <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/themes\/ideal\/images\/_btn-arrow-white.png\" alt=\"\">\n                                <\/div>\n                            <\/div>\n                        \n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":0,"parent":646,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-814","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.5 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Local Network Security - Ideal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/local-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Local Network Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/local-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Ideal\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-18T11:01:06+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/local-network-security\\\/\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/local-network-security\\\/\",\"name\":\"Local Network Security - Ideal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#website\"},\"datePublished\":\"2025-06-17T13:14:21+00:00\",\"dateModified\":\"2025-07-18T11:01:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/local-network-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/local-network-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/local-network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Expertise\",\"item\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security &amp; AI\",\"item\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Local Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#website\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/\",\"name\":\"Ideal\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Local Network Security - Ideal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/local-network-security\/","og_locale":"en_US","og_type":"article","og_title":"Local Network Security","og_url":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/local-network-security\/","og_site_name":"Ideal","article_modified_time":"2025-07-18T11:01:06+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/local-network-security\/","url":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/local-network-security\/","name":"Local Network Security - Ideal","isPartOf":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#website"},"datePublished":"2025-06-17T13:14:21+00:00","dateModified":"2025-07-18T11:01:06+00:00","breadcrumb":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/local-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/local-network-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/local-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.mintcreative.com\/ideal-test\/"},{"@type":"ListItem","position":2,"name":"Expertise","item":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/"},{"@type":"ListItem","position":3,"name":"Cyber Security &amp; AI","item":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/"},{"@type":"ListItem","position":4,"name":"Local Network Security"}]},{"@type":"WebSite","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#website","url":"https:\/\/staging.mintcreative.com\/ideal-test\/","name":"Ideal","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.mintcreative.com\/ideal-test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/pages\/814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/comments?post=814"}],"version-history":[{"count":23,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/pages\/814\/revisions"}],"predecessor-version":[{"id":2442,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/pages\/814\/revisions\/2442"}],"up":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/pages\/646"}],"wp:attachment":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/media?parent=814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}