Firewall & Network Security

[Fill Out the Security Form →] [Book a Call Instead →]

Hero Section

Firewall & Network Security

A firewall out of the box is not a configured firewall. Most businesses are running default settings: open ports, flat networks, and no real segmentation between guest devices and internal systems. We assess what you have, close the gaps, and document what’s protecting you and why.

Firewall deployment projects start at $2,000. Full security overhauls typically run $5,000–$15,000 depending on network complexity and compliance requirements.


The Problem / Why This Matters

A network breach rarely happens because someone cracked a sophisticated perimeter. It happens because a guest Wi-Fi network shared a subnet with the accounting server. Because an old printer with a default password had internet access. Because remote employees connected without a VPN and someone was watching.

These aren’t exotic vulnerabilities. They’re configuration problems, and they’re the majority of what we see when we assess a business network for the first time.

The other issue is compliance. If your business handles payment card data or protected health information, your network security isn’t just a technical decision. It’s a legal requirement with audit trails and documentation requirements attached.


What We Do

We design and implement network security that matches your actual threat model and compliance obligations.

  • UniFi Security Gateway and Dream Machine configuration: proper firewall rule sets, not factory defaults
  • VLAN segmentation: separate network segments for servers, workstations, IoT devices, VoIP, guest access, and BYOD. Devices on one segment can’t reach another unless explicitly permitted
  • IDS/IPS: intrusion detection and prevention configured to alert on and block known threat signatures
  • Content filtering: category-based filtering for malware sites, phishing domains, and policy-restricted content
  • VPN for remote workers: WireGuard or OpenVPN-based remote access so employees connect to office resources securely from anywhere
  • Site-to-site VPN: encrypted tunnels between office locations so branch offices aren’t routing sensitive traffic over the open internet
  • Firewall rule documentation: every rule documented with its purpose, creation date, and owner, so you know what you have and why
  • Compliance-oriented architecture: network designs built to support PCI DSS, HIPAA, and SOC 2 audit requirements

For businesses with compliance requirements, we work directly with our sister company, Unique Compliance Services, to align network security with your formal compliance program.


Our Process

Step 1: Security Assessment We audit your current firewall configuration, network topology, and connected devices. We document what’s open that shouldn’t be, where your segments are (or aren’t), and whether your current hardware can support what you need.

Step 2: Findings and Proposal You get a written findings report: what we found, what the risk is, and what we recommend. The proposal includes a prioritized remediation plan: critical items first, then hardening, then long-term improvements.

Step 3: Implementation We implement changes in a maintenance window to minimize disruption. Network segmentation work requires careful sequencing. We test each change before moving to the next to avoid cutting off systems mid-project.

Step 4: Documentation and Handoff You receive a complete network diagram, VLAN documentation, firewall rule set with explanations, and VPN configuration details. If you’re under compliance audit, this documentation package gives your auditor what they need.


Why Gladiator IT

Network security is not a side service for us. We’ve been building and securing networks since 2012, and our client base includes businesses with real compliance requirements: medical practices under HIPAA, law firms with client data obligations, and financial services companies under various regulatory frameworks.

We use UniFi across all deployments because it gives us consistent, auditable configuration management with a full logging infrastructure. When something happens on the network, we can tell you what it was, when it happened, and what triggered it.

Our sister company, Unique Compliance Services, handles formal compliance programs: PCI DSS assessments, HIPAA gap analyses, SOC 2 readiness. If your security project has a compliance dimension, we coordinate both sides so you’re not managing two separate vendor relationships.

One thing we’re direct about: a firewall and VLAN segmentation are necessary but not sufficient. We’ll tell you if you need endpoint protection, a SIEM, or other controls your environment requires. We won’t recommend things you don’t need.


What You Can Expect

Timeline: Assessment and findings report: 5–7 business days. Firewall deployment and configuration: 1–2 days. Full segmentation and VPN projects: 3–7 days depending on network size. Compliance-driven overhauls run longer and we’ll scope them specifically.

What you need to provide: Access to your current network hardware, your ISP circuit information, a list of business-critical systems and their IP assignments (if you have it), and any existing compliance documentation.

Communication: Security work requires close coordination. We’ll confirm every change with you before executing it and notify you when each phase is complete.


Q: We have a firewall already. Do we actually need this?

A: Maybe. The question isn’t whether you have a firewall. It’s whether it’s configured correctly. Most firewalls we encounter have factory-default or near-default rule sets, no VLAN segmentation, and logging that’s either off or going nowhere. We’ll tell you honestly whether what you have is adequate.

Q: What’s the difference between a firewall project and managed security services?

A: A firewall project gets your security to a baseline: proper configuration, segmentation, and documentation. Managed security services maintain and monitor that baseline over time, including ongoing rule updates, log review, threat response, and keeping firmware current. Both are options; they’re not the same thing.

Q: Do you work with Cisco, Fortinet, or other hardware besides UniFi?

A: We can assess any firewall hardware. For new deployments, we standardize on UniFi because it gives us the best management visibility and audit capability at a competitive cost. If you have an existing investment in another platform, we’ll discuss whether to work with it or replace it.

Q: We’re a medical practice. What specific requirements apply to us?

A: HIPAA’s Security Rule requires access controls, audit logs, transmission security, and network segmentation for systems that touch electronic protected health information. We design networks that meet these requirements and can coordinate with Unique Compliance Services on your formal HIPAA compliance program.

Q: Can you set up VPN so our remote employees connect securely?

A: Yes. We configure remote access VPN using WireGuard or OpenVPN, depending on your environment. Employees install a VPN client and connect to the office network securely from any location. We handle the server configuration, certificate issuance, and client setup for each user.


Get a Quote

Tell us about your current setup and your primary concerns. If you have compliance requirements, mention them. It shapes the scope significantly.

Network Security Quote Form

  • Current firewall hardware (brand and model, or “unknown”)
  • Number of physical office locations
  • Number of remote workers
  • Compliance requirements (PCI, HIPAA, SOC 2, none, unsure)
  • Primary concerns or recent incidents
  • Budget range

Get a Quote

Tell us about your project and we'll follow up within one business day.

Frequently Asked Questions

We have a firewall already. Do we actually need this?
Maybe. The question isn't whether you have a firewall. It's whether it's configured correctly. Most firewalls we encounter have factory-default or near-default rule sets, no VLAN segmentation, and logging that's either off or going nowhere. We'll tell you honestly whether what you have is adequate.
What's the difference between a firewall project and managed security services?
A firewall project gets your security to a baseline: proper configuration, segmentation, and documentation. Managed security services maintain and monitor that baseline over time, including ongoing rule updates, log review, threat response, and keeping firmware current. Both are options; they're not the same thing.
Do you work with Cisco, Fortinet, or other hardware besides UniFi?
We can assess any firewall hardware. For new deployments, we standardize on UniFi because it gives us the best management visibility and audit capability at a competitive cost. If you have an existing investment in another platform, we'll discuss whether to work with it or replace it.
We're a medical practice. What specific requirements apply to us?
HIPAA's Security Rule requires access controls, audit logs, transmission security, and network segmentation for systems that touch electronic protected health information. We design networks that meet these requirements and can coordinate with Unique Compliance Services on your formal HIPAA compliance program.
Can you set up VPN so our remote employees connect securely?
Yes. We configure remote access VPN using WireGuard or OpenVPN, depending on your environment. Employees install a VPN client and connect to the office network securely from any location. We handle the server configuration, certificate issuance, and client setup for each user.

Not Sure Where to Start? That's Exactly What the Assessment Is For.

Our AI Readiness Assessment tells you where the real opportunities are in your business, and what to ignore. It's the fastest way to go from "we know we need AI" to "here's our plan."

Ask AI about Gladiator IT: