We  know  that   a  responsive network  infrastructure  is  integral   to  your  companys  ability  to  share  information  and  communicate with  clients  and  employees.  When  instituted effectively,  a  responsive network  can be an  invaluable asset   to  your business.  The optimal  network and  telecommunications systems can control  your costs,   reduce  risks and function more  efficiently.  SWTL  believes  that   both  large  and  smal l   businesses must   devote  proper  attention  to  the  formulation  and  development   of   these  vital  resources  to achieve optimal  results.  SWTL  is well equipped  to help you plan,  implement ,  optimize,  manage and maintain your network infrastructure -  regardless of  its size or complexity.  We work with industry leaders to deliver proven,  flexible,  and reliable solutions.  

We offer the Following Networking Services

Intrusion Detection Systems

SWTL provides a wide range of Network Intrusion Detection Systems for your company’s data center security needs. A Network Intrusion Detection System is an independent platform which identifies intrusions by examining network traffic and monitors multiple hosts. They are usually connected to the network through various networking devices such as a router, hub, switch etc. NIDS work by monitoring packets on the network wire and attempt to discover if a hacker/cracker is attempting to break into a system (or cause a denial of service attack).
These network-based systems are best at detecting unauthorized outsider access such as cases where an unauthorized user logs in successfully, as well as bandwidth theft or denial of service, which are the major attacks that your organization can suffer.
We offer both:-

1. Signature-Based Intrusion Detection Systems: It uses a rule set to identify intrusions by watching for patterns of events specific to known and documented attacks. It compares the information it gathers against those attack signatures to detect a match.

2. Anomaly-Based Intrusion Detection Systems

It examines ongoing traffic, activity, transactions and behavior in order to identify intrusions by detecting anomalies.

Systems Health Check Audits

There are daily, weekly and monthly checks that can help make a difference in your computer’s health.

SWTL offers these services:

Daily: - Check antivirus definition status, updating where necessary. This will be automatic if managed from a central server.

1. Weekly: - Clean Internet Cache

2. Run Ad-ware

3. Run Spybot

4. Scan disk using installed antivirus

5. Install any updates/patches

Monthly: - Run Disk Cleanup

1. Run Disk Defragmenter

2. Empty Recycle Bin and Trash Folders in your email clien

3. Preventive Maintenance

System Design


Our highly specialized team offers system design consultations to assist our clients realise the best Total Cost of Ownership (TCO) and Return On Investment (ROI) on IT solutions.

System sizing and configuration Assurance

System sizing

Most computer users can be placed into one of three categories:

• Light users. A light user typically runs one program at a time--for example, a word processing program or a line-of-business program.

• Structured task users. A structured task user simultaneously runs two or more programs but does not frequently switch between programs. This user runs programs whose data-processing demands on the system are not heavy--for example, productivity programs such as word processing and an Internet browser.

• Power users. A power user is a more sophisticated user who runs three or more programs, and often has several active at the same time. A power user runs programs whose data processing demands on the system are heavy, such as detailed queries on large databases.

When determining how powerful your servers need to be,our experts consider the types of users who will be using them. Light users place the lightest load on computational resources while power users consume the most computational resources. Also consider the types of programs your server runs. Keep in mind that a terminal server shares executable resources between individual users, just as any of the Windows Server 2003 family operating systems shares executable resources (.dll, .exe, and so on) between individual programs. As a result, the memory requirements for additional users running the same program are typically less than the requirements for the first user to load the application. For adequate performance, a terminal server as we recommend requires a Pentium or higher processor. A terminal server requires a minimum of 128 MB RAM, plus additional RAM for each user to support running each user's programs on the server. An additional 10 MB RAM is recommended for each light user and up to 21 MB RAM for each power user. In general, processor and memory requirements scale linearly: You can support double the number of users on a multiprocessor-capable Pentium system by doubling the number of processors and doubling the amount of memory. Purchasing a system that supports multiple processors, even if you initially purchase only one processor, allows you to add capacity easily as your requirements grow. Performance can vary depending on the programs you run on a terminal server. To judge the processing power and RAM required for each user, test your system by running the programs you use. The bus architecture in single and multiprocessor systems also affects system performance. The ISA (AT bus) architecture is low bandwidth and is not recommended for a terminal server. We recommend that you use a higher-performance bus, such as Extended Industry Standard Architecture (EISA), Micro Channel Archictecture (MCA), Pheripheral Component Interconnect (PCI), PCI-X, or InfiniBand for best performance. All of these buses support the sustained high data transfer rates typically required when running Terminal Server. Peripherals can affect the performance of a terminal server.

Configuration Assuarance

Perform automated network and security audit and analysis with the Cisco Configuration Assurance Solution (CAS). Cisco CAS gives network engineers and security managers a clear, up-to-date view of network configuration problems, security exposures, service resiliency, and policy noncompliance. Using a high-fidelity model of the network infrastructure that accurately simulates the behavior of multivendor routers, switches, and protocols, Cisco CAS performs a broad range of analyses to help clients comply with regulatory and IT requirements.

Features and benefits of Configuration Assuarance

a. Detects multivendor network configuration problems before they disrupt network operations using an extensive rules library with configurable rules

b. Verifies that network security policies have been implemented effectively using tests that: Simulate unauthorized traffic flows in a virtual model of the production network

c. Identify security gaps and pinpoint misconfigured nodes that block valid connectivity

d. Inspect complex backup configurations across the network

e. Checks and reports compliance with industry and regulatory requirements

f. Supports key processes from popular IT governance frameworks

g. Automatically gathers and parses Cisco IOS Software and Cisco Catalyst OS configurations


You are here: Home Networking


P. O. Box 99017 - 80107
Sharaf House, Archbishop Makarios Close, Off Moi Avenue,Mombasa - Kenya

Tel:     +254 41 2224938, 2220230, 2223990
Wireless: +254 20 2319735/8
Fax:     +254 41 2220086
Cell:     +254 787 940892, +254 703 453850
Email : This email address is being protected from spambots. You need JavaScript enabled to view it.

Vison Plaza, 2nd Floor Suite 18,
Mombasa Road
P. O. Box 52439 -00100 Nairobi

Tel: +254 20 2326415/6
Fax: +254 20 828921
Cell: +254 788 559021 +254 705 203402
Email : This email address is being protected from spambots. You need JavaScript enabled to view it.


LiveZilla Live Help