Explore a wide range of Thomason Technologies network solutions and services:

Network Security – Industrial Strength

The TTL1000 is changing the way you think about ICS security. ICS networks have traditionally deployed only perimeter level security measures, leaving the internal network traffic blind to the data center. Now, the TTL100 with SpyGOOSE gives you the ability to:

  • Monitor and filter layer 3-7 network traffic
  • Passively monitor all layer 2 communications, including protocols like GOOSE and DNP3
  • Extend and tailor the security policies deployed in the data center out to the ICS network
  • Get real-time contextual analysis of all traffic on the network in order to detect a possible compromise.

Learn About the TTL1000
TTL1000 Security Device

Thomason Technologies, LLC has teamed up with the leading manufacturer of utility-grade computers and the best-of-breed network security company to bring you the most capable network-based security appliance available.

Learn About the TTL1000


Did You Miss Our Webinar?

Today, the question is not if you will be hacked – but when. As a founding member of the AFCERT with 30 years of experience in the cybersecurity field, David Thomason shared his vast experience in hacker tracking. The original webinar aired on February 23 from 2 – 3 pm (CST) – but his tips and pointers are helpful to this day! We want to make sure those who may have missed the original webinar still have the opportunity to learn How to Catch a Hacker – click below!

Click Here To View

AMP Everywhere

Thomason Tech offers the Cisco Advanced Malware Protection (AMP) solution, a security solution that addresses the full lifecycle of the advanced malware problem. It gives visibility and control to rapidly detect, contain, and remediate threats if they evade front-line defenses. AMP is an intelligence-driven security solution that gives you comprehensive protection for your organization across the attack continuum – before, during, and after an attack.

Read the Latest from Our Blog

3108, 2016

Thomason Tech’s Top-5 Tips for Securing SCADA Networks

SCADA (Supervisory Control And Data Acquisition) networks drive automation in factories, petrochemical plants, refineries, utility substations and a lot more. For a couple of decades there were relatively few other places where computer networks were [...]

1808, 2016

Security Questions for Managers

http://www.thomasontech.com/wp-content/uploads/2016/08/Security-Questions-for-Managers.pdf Click Here To Download

1808, 2016

Thomason Technologies Partners with Neox Networks GmbH to Expand Distribution to Europe

SAN ANTONIO, TEXAS (PRWEB) AUGUST 12, 2016 Thomason Technologies, LLC announces Neox Networks GmbH, Germany as their first distributor in Europe. “Neox is exactly the kind of distributor we need in Europe. Neox's vast experience [...]

2602, 2016

How Do You Know The Company You Are About To Acquire Hasn’t Been Hacked?

In April of 2015, Telstra, an Australian Company acquired Pacnet, a Singapore and Hong Kong based services provider.  Barely a month later, Telstra announced that Pacnet had been hacked and that customer information may have [...]

Proud to be Partnered With: