Cyber · 03 / Network & Endpoint

The perimeter is
wherever your data is.

Firewalls still matter. They are not enough. We engineer and operate the full network and endpoint stack — next-generation firewalls, identity-based segmentation, zero-trust access, DNS and web filtering, MDM, and patch orchestration — for Tennessee and Mississippi organizations that need security architecture written down, verified, and defended at two in the morning.

FrameworkNIST SP 800-207 ZTA
BaselineCIS + STIG hardening
Firewall vendorsPAN · Forti · Cisco + pfSense
MDM platformsIntune · Jamf · Kandji + Hexnode
ZTNACloudflare · Zscaler + Twingate
CoverageTN + MS 24 / 7
83%
Breaches touching identity
Verizon DBIR: share of breaches involving stolen or misused credentials — the case for identity-first segmentation.
BYOD
Endpoints we do not own
Contractor laptops, vendor tablets, employee phones — every one reaches some system you are responsible for.
19 dy
Median patch latency
Industry average time from CVE publication to fleet deployment. Our managed rings target under seven.
0
Tools required to be ours
We work with your existing firewall, MDM, and identity provider — replacement is an outcome, never a prerequisite.
01 / Why Perimeter Alone Isn't Enough

The network you thought you had
is not the network you have.

Twenty years ago, perimeter security was a reasonable abstraction. You had a building, a firewall, a domain, and a VPN concentrator. Anything inside the wall was trusted. Anything outside required a ticket. That model is gone — and the tools built around it cannot carry the new workload alone.

Three forces pulled the perimeter apart. First, cloud sprawl: your payroll runs in one SaaS, your CRM in another, your file shares in a third, and your inventory system is a vendor portal that lives on someone else's AWS account. None of that traffic touches your firewall on the way out. Every one of those doorways is its own perimeter now.

Second, BYOD and hybrid work. Employees answer email on personal phones. Contractors join project calls from home laptops you have never seen. Field staff sync data from trucks over LTE. The endpoint you need to defend is no longer the workstation bolted to a cubicle — it is a rolling inventory of hardware you do not own and cannot touch.

Third, vendor remote access. Your HVAC vendor has a jumpbox. Your printer fleet phones home. Your door-controller installer left behind a maintenance tunnel. Your billing partner needs nightly VPN access to pull data. Every one of those connections is a hole drilled through the wall by somebody who is not on your security team, for a reason that made business sense at the time.

The result is an extended perimeter that runs across the entire public internet, every SaaS tenant your team has signed up for, and every device touching any of it. You cannot defend that line by building a taller wall. You defend it by assuming the wall is already porous and building layered controls around the things that actually matter — identities, data, and the trust decisions made the moment someone asks for access.

Network security still matters. A well-tuned next-generation firewall still stops an enormous amount of stupidity at the door. A properly segmented network still contains blast radius. DNS filtering still catches the cheap phishing. But the firewall is now one layer in a defense-in-depth stack — not the whole wall.

02 / Defense-in-Depth

Seven layers,
written down.

Any single control can fail. Defense-in-depth assumes that some will — and stacks the layers so that a failure in one does not become a full compromise. Each of the seven layers below is a deliverable we design, deploy, and operate.

L · 01Identity
Who is asking, and should they be? MFA everywhere, conditional access policies, privileged-access segmentation, and continuous authentication signals feeding every other layer below.
Entra IDOktaDuoYubiKey
L · 02Device
Is the device healthy enough to be trusted? MDM / UEM enrollment, CIS or STIG baseline, disk encryption, EDR, patch posture, and jailbreak / rooting detection feeding the policy engine.
IntuneJamf ProKandjiHexnodeLookout
L · 03Network
What is this packet allowed to touch? Next-generation firewall at the edge, VLAN segmentation between trust zones, microsegmentation inside production, and identity-aware routing where policy demands it.
Palo AltoFortinetCisco MerakiFirepowerpfSense / OPNsense
L · 04Access
Per-application, not per-network. ZTNA brokers replacing full-tunnel user VPN; site-to-site IPSec retained where layer-3 reachability is genuinely required. DNS filtering at the edge kills low-effort phishing before the browser ever loads.
Cloudflare AccessZscaler ZPATwingateTailscaleUmbrellaNextDNS
L · 05Application
The request made it this far — now inspect it. Web application firewall in front of public properties, API gateways with rate-limiting and schema enforcement, and runtime protection where the application warrants it.
Cloudflare WAFAWS WAFImpervaModSecurity
L · 06Detection
Assume some attacks got through. Find them fast. IDS / IPS on segment boundaries, network flow analytics, endpoint telemetry, and SIEM correlation — feeding the managed SOC. Details on the Managed SOC page.
SuricataZeekSentinelDefender XDRCrowdStrike
L · 07Response
When a layer fails, contain the blast. Documented playbooks, network quarantine, disabled credentials, forensic capture, and — if needed — the DFIR path. Details on the Incident Response page.
RunbooksSOARBreak-glassCarrier-ready
03 / The Offerings

Eight engineered
capabilities.

Each of the eight is a standalone engagement. Most clients begin with two or three — usually firewall plus endpoint plus MDM — and add the rest across a twelve-to-eighteen-month program roadmap. We do not require you to buy the whole stack to start.

Firewall Management01 / 08

Next-generation firewall

Design, deploy, and manage Palo Alto, Fortinet, Cisco Meraki or Firepower, or pfSense / OPNsense for SMB environments. Rule hygiene, app-ID tuning, signature updates, signed change control, and 24x7 monitoring. We handle the vendor — you read the quarterly report.

PAN-OS · FortiOS · Meraki · Firepower · pfSense
Network Segmentation02 / 08

VLAN + microsegmentation

Tiered VLAN architecture between trust zones — users, servers, printers, IoT, door controllers, cameras, guest — plus identity-based microsegmentation inside production where a flat L2 would otherwise give any compromise total reach. Diagrams delivered; configs live in your repo.

802.1Q · 802.1X · pxGrid · Illumio-class tooling
Zero Trust Architecture03 / 08

ZTA, NIST SP 800-207

Identity-based segmentation, continuous authentication, least-privilege authorization, and device-posture enforcement. Deployed in the five phases NIST describes — discovery, identity foundation, policy engine, enforcement, iteration. Nothing breaks on day one; nothing stays the same by month six.

NIST SP 800-207 · Entra CA · Okta · Duo
Remote Access04 / 08

VPN modernization + ZTNA

Site-to-site IPSec for branch and OT connectivity — kept where genuinely needed. Remote-user migration from traditional VPN concentrators to ZTNA brokers (Cloudflare Access, Zscaler Private Access, Twingate, Tailscale) for per-application, identity-aware access without inbound port exposure.

Cloudflare · Zscaler · Twingate · Tailscale · IPSec
Endpoint Hardening05 / 08

CIS + STIG baselines

CIS Benchmark Level 1 or Level 2 baselines for Windows, macOS, and Linux endpoints; DISA STIG where regulated work requires it. Deployed via Intune, Jamf, Kandji, Ansible, or Puppet depending on platform, with drift monitored and documented exceptions tracked.

CIS · DISA STIG · Ansible · Puppet · Intune CIS templates
MDM / UEM06 / 08

Mobile + endpoint management

Microsoft Intune for Windows-heavy environments, Jamf Pro or Kandji for Apple fleets, Hexnode for mixed estates. Enrollment flows, compliance policies, conditional access integration, kiosk and shared-device configurations, and a quarterly compliance posture review.

Intune · Jamf Pro · Kandji · Hexnode
Patch Orchestration07 / 08

Managed patch rings

Windows via Intune + WSUS or Autopatch; Mac via Kandji or Jamf; Linux via Ansible or distribution-native tooling. For smaller fleets, Automox, NinjaOne, or PDQ Deploy. Every ring has a test cohort, a production cohort, a rollback plan, and a monthly report on actual coverage.

Intune · Kandji · Jamf · Automox · NinjaOne
DNS · WAF · BYOD · MTD08 / 08

Edge + BYOD + mobile

DNS filtering at the edge (Cisco Umbrella, NextDNS, DNSFilter), WAF in front of public web (Cloudflare, AWS WAF, Imperva), IDS / IPS on segment boundaries, MAM-without-MDM containerization for BYOD and contractors, and mobile threat defense (Lookout, Zimperium) where risk warrants.

Umbrella · NextDNS · Cloudflare · Lookout · Zimperium
04 / How We Deploy

Assess. Design. Implement.
Manage.

Every engagement runs the same four-stage track. The depth varies — a ten-person firm and a five-site hospital system are not the same engagement — but the sequence is constant, and each stage closes with a named deliverable you sign off on before the next begins.

01
Stage · Assess

Architecture review

Firewall config export, MDM compliance report, endpoint baseline sample, network topology walk, identity-provider audit, and a two-hour interview with whoever runs your environment today. Read-only access only. Deliverable is a written architecture assessment and a prioritized risk register.

Output: Risk register · architecture doc
02
Stage · Design

Target-state design

Segmentation diagram, firewall rule book, ZTNA application catalog, MDM configuration profile, patch ring structure, and a change-management plan. Every decision is written down, every trade-off is named, and every cost is scoped before a single port is changed.

Output: Signed design doc · cost model
03
Stage · Implement

Staged rollout

Pilot cohort first, production cohort second, then the long tail. Every cutover has a rollback plan; every rollback plan has been tested. Runbooks and config artifacts land in a repository you own — not a consultant's laptop.

Output: Live controls · runbook library
04
Stage · Manage

24 / 7 operations

Rule review cadence, signature updates, patch rings, MDM policy drift, ZTNA application lifecycle, monthly posture report, and quarterly executive brief. Escalation paths named. Exit clauses portable — you can take the program with you.

Output: Monthly metrics · quarterly brief
05 / Physical + Cyber

One program.
One door.

Most vendors treat the door controller and the firewall as someone else's problem. We do not. Shield of Steel provides the officers walking your property, and we engineer the network those door controllers and cameras live on — because the gap between the two is where compromises actually start.

Physical

What your officers already deliver

Armed and unarmed officers, mobile patrols, alarm response, post orders, and executive protection — all licensed in TN and MS and dispatched 24/7 from Memphis.

  • Access-controlled entries and documented post orders
  • Camera coverage with written review cadence
  • Visitor management and contractor escort
  • Carrier-ready written incident documentation
Shield of Steel · PhysicalView services →
Cyber

What the network side adds

Door controllers, cameras, intercoms, and building-management gear all ride your network. Most breaches we see start with an unsegmented IP camera or a vendor jumpbox nobody remembered was still there.

  • Isolated VLANs for door controllers and cameras
  • Firewall rules written against named device groups
  • Vendor remote-access replaced with auditable ZTNA
  • Single escalation path across physical and cyber
Shield of Steel · CyberView cyber →
06 / Network & Endpoint FAQ

Questions we get
in the first call.

If your question isn't covered here, the senior engineer who would design your deployment will take the call directly. Dispatch routes after hours too; network work doesn't stop for weekends.

Do you replace my existing firewall, or work with what's already in place?

Most of the time, we work with what you have. If you're running a recent-generation Palo Alto, Fortinet, Cisco Meraki or Firepower, or a well-sized pfSense or OPNsense, our engineers will take over operations — rule review, change control, signature tuning, and 24x7 monitoring — without a forklift upgrade.

We only recommend replacement when the existing device is past end-of-life, chronically undersized for current throughput, or architecturally incompatible with the segmentation design the assessment calls for. When we do recommend replacement, the justification is written, the cost is scoped, and the decision stays with you.

What does zero trust actually mean in practice — and what changes on day one?

Zero trust is shorthand for three operational shifts: every access request is authenticated and authorized, regardless of network location; segmentation follows identity rather than IP range; and device posture is evaluated continuously rather than once at login. It is not a product — it is an architecture.

In practice, day one looks like an identity audit, an application inventory, and a small pilot cohort moving onto a ZTNA broker — often Cloudflare Access, Zscaler Private Access, Twingate, or Tailscale — while the rest of the environment continues to run as-is. We follow the deployment phases described in NIST SP 800-207: discovery, identity foundation, policy engine, enforcement, and iteration. Nothing flips overnight; nothing breaks overnight either.

Do you manage patches, or is that still on our IT team?

We manage patches end-to-end when you want us to. For Windows fleets, we run Microsoft Intune with WSUS, Autopatch, or a third-party orchestrator like Automox, NinjaOne, or PDQ Deploy depending on fleet size and license posture. For Mac fleets, Kandji and Jamf both handle OS and third-party patch orchestration. For Linux, it's Ansible, Puppet, or distribution-native tooling.

Every patch ring has documented approval, a staged rollout, and a rollback plan — and we report on actual patch coverage monthly, not claimed coverage. If you want to keep patching in-house, we'll design the rings and the runbook and hand them over.

How does MDM work for contractors and BYOD, without owning their devices?

For contractors and BYOD employees, we deploy MAM — mobile application management — without full MDM enrollment. In Microsoft 365 environments, that means Intune app protection policies applied to Outlook, Teams, OneDrive, and any custom line-of-business apps: the corporate data is containerized, a passcode is required, cut-and-paste into personal apps is blocked, and a selective wipe removes the work container without touching personal photos or messages.

The user never loses control of their device; the business never loses control of its data. Where risk justifies it, we layer Lookout or Zimperium mobile threat defense on top to catch phishing, malicious profiles, and compromised apps. For Apple-first environments, Jamf Pro and Kandji both support equivalent managed-apps patterns.

How does this integrate with the physical access control Shield of Steel already runs?

Door controllers, IP cameras, and intercoms all live on your network, and they're a common attack surface that most vendors ignore. Unsegmented IoT was the entry vector on at least three mid-market breaches we've responded to in the last year.

When we take on network security for a client we already provide physical security for, the two programs merge: door controllers get their own isolated VLAN, camera traffic runs on a segment with no east-west visibility, the firewall rules are written against named device groups instead of DHCP ranges, and the same engineering team that writes your officer post orders writes your network segmentation policy. It's one signed program, one reporting cadence, and one escalation path when something unusual shows up at two in the morning.

ZTNA vs traditional VPN — when is each the right call?

Site-to-site IPSec VPNs remain the right tool for connecting branch locations, retail endpoints, and operational technology environments where you genuinely need layer-3 reachability between networks. We keep those.

For remote users connecting to corporate applications, ZTNA is almost always the better answer — per-application access, no broad network drop, identity-aware policy, and no inbound port exposure on a concentrator. We routinely run both in parallel: IPSec for branch connectivity, ZTNA for user access. Turning off the user VPN is usually a twelve-to-sixteen-week migration depending on how many internal applications need to be inventoried and published.

Do you need deep access to our infrastructure just to give us an assessment?

No. A useful initial assessment can be completed from a read-only vantage point — firewall configuration exports, an MDM compliance report, a sampled endpoint baseline, and a two-hour interview with whoever runs your environment today. We do not ask for domain admin, firewall root, or cloud tenant owner credentials to deliver a written architecture review.

If the engagement moves forward into implementation, privileged access is scoped, named, time-bound, and logged — and revoked at project close unless you contract us for ongoing managed services. All privileged sessions are recorded, and session logs are made available on request.

Can you help us meet CMMC, HIPAA, PCI, or CJIS requirements for network and endpoint controls?

Yes. Network segmentation, firewall rule review, endpoint configuration baselines, patch management, and mobile-device control are among the most heavily tested domains in every major framework we see.

Our deployments are documented against the relevant control families: NIST SP 800-171 and 800-53 for CMMC and federal work, HIPAA Security Rule technical safeguards for healthcare, PCI-DSS requirements 1, 2, 5, 6, and 11 for merchant environments, and CJIS Security Policy for law-enforcement adjacent work. We deliver the control-mapping artifact alongside the technical build so your assessor does not have to reverse-engineer it. For a full CMMC engagement, see the CMMC & Compliance page.

We have a small IT team. Do we need a full SOC, or is this scaled to smaller organizations?

Both, and we scale accordingly. For a twenty-person professional-services firm or a single-site manufacturer, a pfSense or OPNsense firewall, NextDNS for filtering, Automox for patching, and Intune MAM for BYOD is a proportional program — and we run it as a fractional managed service.

For a multi-site healthcare system with five hundred endpoints and PHI in motion, we'll deploy Palo Alto next-generation firewalls, a full Intune plus Kandji posture, Cloudflare Access for remote work, and Cisco Umbrella with category policies enforced at the DNS layer. The program is written to fit the organization; the organization is not asked to fit a predetermined stack.

What happens when a device fails posture — does the user just get locked out?

That depends on the policy we write with you, and it is almost never a hard lockout. The typical posture failure cascade is: the device is flagged in the MDM or conditional-access engine, the user sees a remediation prompt (patch the OS, re-enable disk encryption, reinstall EDR), access to sensitive applications is restricted while access to help-desk and password-reset tools is preserved, and a ticket is opened automatically.

A hard lockout happens when the posture failure indicates active compromise — known-malicious process running, credential theft signal from EDR, jailbreak detection — and even then, the lockout is narrow enough that the user can reach help. Users should experience policy as guardrails, not as a trap door.

Will you write this down, so our next vendor or internal team can take it over?

Yes, and that commitment is in every engagement letter. Firewall configurations, segmentation diagrams, MDM baselines, patch rings, ZTNA policies, and break-glass procedures are all documented in a runbook you own from day one.

If you ever bring the work in-house or switch to another provider, the handoff is a file share and a two-hour walk-through — not a six-month reverse-engineering project. Reports that sit on a shelf are worth less than ones that travel; we build for portability on purpose. About twenty-five percent of our former managed clients run the program internally afterward, with our runbooks, and we are glad to see them do it.

07 / Next Step

Start with a
written assessment.

Tell us your firewall vendor, your MDM platform, and what keeps your IT lead up at night. A senior engineer — the one who would design your deployment — will be on a call with you within two business days. Initial architecture assessments are scope-priced; the first conversation is always free.