LOCKDOWN NETWORKS

WEBSITE CONTENT WRITING SAMPLES

The following pages are samples of web page content written for Lockdown Networks, a Seattle-based high-tech company specializing in network security appliances and software. In December, 2004, I was hired by The Creative Group, a Seattle division of Robert Half International, to write new content for Lockdown Network's web pages. In a four-week period, I produced about twenty pages of web content, which was added to the web site in January, 2005.

As of 2008, Lockdown Networks has ceased operations and closed their web site.

 


MAIN PAGE

The main page of Lockdown Networks's web site included two Javascript applications -- the "Markets" window, and the "Products" window. When visitors to the Lockdown Networks web site accessed the main page, they would see two separate mini-windows, with a menu of items to the left of each window. By clicking on the menu items for each window (listed in red below), visitors would receive short blurbs in each mini-window, describing the Markets serviced by Lockdown Networks, or the individual Lockdown Networks products.

(NOTE: The <Learn more> tags below were used on the Lockdown Networks main page as links to other pages. They do not actually work as links on this page.)

 

"MARKETS" WINDOW

Main Blurb

PROACTIVE MANAGEMENT FOR YOUR ENTIRE NETWORK…

Lockdown Networks is the leader in next-generation appliance-based Vulnerability Management and Policy Enforcement for wired and wireless networks. <Learn more>

#1 -- ENTERPRISE

Whether your business is high-tech, telecommunications, retail, manufacturing, or services, Lockdown’s appliance-based solutions will help you to keep your networks safe and secure from viruses and hacker attacks. <Learn more>

#2 -- HEALTHCARE

Lockdown technology can help protect your Digital Patient Records, enforce security policies on wired and wireless devices (including PDAs and medical devices with a network connection), and keep your network current with HIPAA compliance laws. <Learn more>

#3 -- FINANCIAL

Lockdown’s appliance-based solutions can protect your clients’ critical financial data from hackers and identity thieves, while helping you to keep your network in compliance with GLBA, Sarbanes-Oxley, and other government regulations. <Learn more>

#4 -- EDUCATIONAL

Lockdown technology can help your educational institution to enforce network security policies for multiple departments, keep student and faculty records safe, protect against virus attacks, and regulate P2P file sharing. <Learn more>

#5 -- GOVERNMENT

Lockdown technology can protect your wired and wireless networks from cyber-attacks, while helping your local, federal, or state agency to comply with OMB, GAO, FISMA, and other regulations. <Learn more>

#6 -- FREE AUDIT

Try Lockdown’s Vulnerability Management Solution to discover and remediate vulnerabilities on your network today.

  • Secure results that only YOU will see.
  • Web-based, no downloads required.
  • Receive instant reports on network vulnerabilities.
  • Click here to view Free Audit data security policy.


"PRODUCTS" WINDOW

Main Blurb

PRODUCT SOLUTIONS

Lockdown’s appliances audit your wired and wireless networks and identify vulnerabilities on your network devices, allowing your IT staff to eliminate those vulnerabilities and enforce security policies. Lockdown’s appliance-based Vulnerability Management and Policy Enforcement solutions are architected for enterprise scalability, easy to use, and can be set up and auditing your system in 15 minutes. <Learn more>

#1 -- Auditor

Lockdown Auditor provides complete appliance-based end-to-end automation of Vulnerability Management and Policy Enforcement across enterprise networks. Lockdown Auditor performs consolidated auditing and reporting on all devices on your network, and assists IT professionals with vulnerabilities remediation through an integrated workflow and ticketing system. <Learn more>

#2 -- DataSafe

Lockdown DataSafe is the industry-leading Vulnerability Management web interface. Lockdown DataSafe provides a common console for Lockdown Auditors, AuditPoints, and Wireless Sentry to manage and report vulnerability data for all your network devices. Use the Lockdown Web Interface to create customized auditing for policy enforcement of different devices on your network. <Learn more>

#3 -- Wireless

Lockdown Wireless Sentry is the industry’s first appliance-based Vulnerability Management solution for wireless networks. Lockdown Wireless Sentry gives your network administrators the power to enforce security policies for all wireless 802.11a/b/g access points and clients. <Learn more>

#4 -- AuditPoint

Lockdown AuditPoint gives you an outside-in look at your network from a hacker’s point of view. With Lockdown AuditPoint, you can audit your network and discover vulnerabilities from outside the firewall. Lockdown AuditPoint provides comprehensive 360-degree auditing for internal and external networks, allowing you to audit remote/branch office networks from a central location. <Learn more>


 

"ABOUT US" PAGE

 

About Lockdown Networks

Lockdown Networks, Inc. is the leader in next-generation appliance-based vulnerability management for securing wired and wireless enterprise networks. Lockdown Networks provides a unique implementation of proactive vulnerability management appliances that continuously monitor your corporate network. Our appliances audit, prioritize, remediate, report, and eliminate network security vulnerabilities (e.g. misconfigurations, poor policy compliance, user administration errors, and vulnerabilities caused by software patches/updates). Lockdown technology allows organizations to dramatically reduce the risk of outside attacks and to track real-time information on their network security health.

Network Security Challenges

In a time when business networks must be protected 24/7/365, most companies still take a reactive approach to network security. That is, they try to protect the known vulnerabilities of their networks, using firewalls, intrusion detection systems, and anti-virus programs. But hackers and digital criminals are experts at finding the unknown vulnerabilities in a network. Every day, they come up with new ways to get past the firewalls, dodge the intrusion detection systems, and access the private information they wish to exploit. Or they create even more sophisticated and destructive viruses to outwit the latest anti-virus software.

According to data from the Computer Security Institute (CSI), 94% of all exploited networks have deployed some and/or all of the latest security technologies. Clearly, firewalls, anti-virus programs, and other security devices are only part of the solution.

At Lockdown Networks, we specialize in providing proactive network security. Our policy of vulnerability assessment and management is now considered best-practice for enterprises that require their valuable digital assets to be secured. According to Mark Nicolett, Vice President of Gartner Research, "Enterprises that implement a vulnerability management process will experience 90 percent fewer successful attacks than those that make an equal investment only in intrusion detection systems."

Our appliance-based solutions continuously audit your network to identify and eliminate vulnerabilities, keeping your data safe and secure. In addition, our appliances also monitor your network as needed for compliance with HIPAA, Sarbanes-Oxley, GLBA, and FISMA regulations. Lockdown Networks technology is currently serving clients in multiple markets, including retail, education, healthcare, financial, and federal, state, and local governments.


 

"PRODUCTS" PAGE

This page offered detailed descriptions of Lockdown Networks's appliance-based security products.

 

Overview

Lockdown Auditor

Lockdown Auditor provides appliance-based end-to-end automation of Vulnerability Management and Policy Enforcement across enterprise networks. Lockdown Auditor performs consolidated auditing and reporting on all devices on your network, and assists IT professionals with vulnerability remediation through an integrated workflow and ticketing system. With its modular architecture, Lockdown Auditor can be deployed and reporting on your network devices within 15 minutes.

Lockdown DataSafe

Lockdown DataSafe is the industry-leading Vulnerability Management web interface, providing a common console for managing all your Lockdown appliances. Lockdown DataSafe works with Lockdown Auditors, AuditPoints, and Wireless Sentry devices to manage and report vulnerability data across your entire network. Use the Lockdown Web Interface to create customized auditing for policy enforcement of different devices on your network. The Lockdown Web Interface also serves as a central archive for vulnerability data collected from all your Lockdown appliances.

Lockdown Wireless Sentry

Lockdown Wireless Sentry is the industry’s first appliance-based Vulnerability Management solution for wireless networks. Lockdown Wireless Sentry gives your network administrators the power to enforce security policies for all wireless 802.11a/b/g access points and clients. Lockdown Wireless Sentry continuously monitors to ensure wireless access policy enforcement against rogue and suspicious devices, and against unauthorized access points.

Lockdown AuditPoint

Lockdown AuditPoint gives you an outside-in look at your network from a hacker’s point of view. With Lockdown AuditPoint, you can audit your network and discover vulnerabilities from outside the firewall. Lockdown AuditPoint provides comprehensive 360-degree auditing for internal and external networks, allowing you to audit remote/branch office networks from a central location. Lockdown AuditPoint extends the reach of Lockdown Auditor to audit devices through the firewall in the DMZ for externally-facing devices, on the network perimeter, and in remote/branch offices.

Lockdown Operations Center

LOC is a dedicated team of vulnerability engineers who identify new vulnerabilities and exploits to create LOCsets. The Lockdown Networks solution involves updating your subscribed Lockdown appliances with the latest LOCsets (vulnerability tests and hacker signatures) at an on-going basis. This process happens automatically and requires no intervention from your IT staff. No longer do they have to constantly monitor vendor websites for the latest problems. The LOC executes the latest audits, and alerts your organization of any new weaknesses found. A full year of service (LOCsets, vulnerability audit tools, system updates, etc) is automatically included in the initial price or extended maintenance service with Lockdown Networks.

With the rapid discovery of new vulnerabilities and exploits, regular audits are not enough to provide adequate protection for your network. Lockdown appliances automatically update every 12 hours to add new LOCsets and available software upgrades. Approximately 5-25 unique vulnerabilities are added each week to Lockdown Networks’ risk management database.


 

"SOLUTIONS" PAGE

This page included information about Lockdown Networks's security solutions.

 

OVERVIEW

Lockdown Networks solution is a family of hardened appliances that are architected to provide vulnerability management and policy enforcement for enterprise networks. The Lockdown appliance-based Vulnerability Management Solution provides the most effective resolution for protecting enterprise networks and enforcing security policies. The advantages of Lockdown’s appliance-based Vulnerability Management solutions include:

Accuracy -- Utilizing device fingerprinting and our unique "attack simulation methodology," Lockdown Networks solutions deliver the highest quality vulnerability discovery and assessment results.

Reliability -- Lockdown appliances are built on a hardened Linux-based operating system to ensure the highest availability and performance level for working with enterprise networks.

Scalability -- Lockdown Networks appliance configurations deliver ultimate scalability. Our appliances support small- to medium-sized businesses, remote offices, and corporate LAN, VPN, and wireless networks up to millions of devices.

Performance – To keep your network safe from vulnerabilities, all devices should be audited once every 24 hours. Lockdown Networks appliance-based systems have the performance capability to assess and manage vulnerabilities for thousands of devices in a single 24-hour period.

Ease-of-Use -- Our appliances can be instantly deployed on your network. Our web-based GUI is easy for customers to use and requires no special training. Most Lockdown Networks customers can deploy Lockdown appliances and be auditing and reporting on their network devices within 15 minutes.

Centralized Web-based Management – A secure web interface provides centralized reporting and management for all Lockdown appliances. Reporting analytics pinpoint the most critical vulnerabilities and devices on your network, and directs IT resources to fix those vulnerabilities for quick remediation. Lockdown Web Interface also features customized notification, allowing you to set notification procedures so that certain IT managers will be notified of vulnerabilities for different devices on your network. The web interface offers customized real-time executive and technical reports, which are all archived and searchable.

Cost-efficiency -- Lockdown Networks’ solutions offer the lowest total cost of ownership in vulnerability management technology. Our appliance-based architecture automates the entire vulnerability management and policy enforcement process. This eliminates the costly and time-consuming labor and maintenance of software-based Vulnerability Management applications. Lockdown is a zero-maintenance appliance with no software to install and no hidden IT costs.

Lockdown appliances are plug-and-play, and can be quickly and easily deployed in 15 minutes. The scalability of Lockdown technology allows you to add new appliances and monitor additional networks and devices with no additional overhead. With software, there are additional labor and management costs associating with scaling up, and with configuration and data storage.

In addition, Lockdown provides centralized reporting under a dynamic web interface. This allows you to customize vulnerability reporting for IT managers in different departments in your organization, thus saving you the labor involved in consolidating reporting in software-based vulnerability management applications.


>>> Back to top

>>> Home > Writing Services > Website Content > Lockdown Networks Website Content

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Article Writing - Brochure Copywriting - Case Studies - Executive Summaries - Newsletter Writing - Public Relations Writing
Video Script Writing - Technical Writing - White Papers - Social Media Copywriting