Plamtex Logo

Plamtex

Emergency Support: +44 843 886 8171

Technical Requirements for Plamtex Security Systems

Making sure your infrastructure is ready before we get started

We've been doing this long enough to know that technical onboarding can feel daunting. But here's the thing – most UK businesses already have what they need. Our firewall management and security solutions are designed to work with standard enterprise setups, not against them.

What follows isn't meant to scare you off. It's just the practical stuff we need to discuss before implementing proper security measures for your network.

Network infrastructure and security management systems

Network Infrastructure

  • Dedicated internet connection (minimum 100 Mbps symmetric)
  • Static IP addresses for primary and backup gateways
  • Existing router with bridge mode capability
  • VLAN support for network segmentation
  • Remote management access (SSH or secure web portal)

Server Environment

  • Virtual machine support (VMware ESXi 6.7+ or similar)
  • Minimum 8GB RAM allocated per firewall instance
  • 80GB storage with SSD preferred
  • Dual-core processor minimum (quad-core recommended)
  • Backup infrastructure with daily snapshot capability

Security Baseline

  • Current antivirus or endpoint protection deployed
  • Active Directory or equivalent authentication system
  • VPN capability for remote workforce
  • Logging infrastructure (syslog server preferred)
  • Patch management process already in place
Security specialist reviewing technical requirements

Why These Requirements Matter

Every item on this list serves a purpose. We're not padding the specs or asking for more than you actually need. This is what real network security requires in 2025.

Integration Considerations

Existing Systems

We work with what you've got. Most Southampton businesses we've partnered with already run Windows Server environments, and that's perfectly fine. Our firewall solutions integrate cleanly with:

  • Microsoft Active Directory and Azure AD
  • Cisco, Juniper, and Fortinet networking equipment
  • SIEM platforms like Splunk or ELK Stack
  • Cloud environments (AWS, Azure, Google Cloud)
  • Legacy applications requiring specific port configurations

Network Performance

Your users won't notice the firewall is there – that's the goal. We configure everything to minimize latency and maximize throughput. If your team complains about slow connections after implementation, we've done something wrong.

Typical performance metrics post-deployment:

  • Sub-5ms latency addition for standard traffic
  • 95%+ throughput retention on gigabit connections
  • Zero packet loss under normal operating conditions

Monitoring and Management

You'll need visibility into what's happening. We provide dashboard access and reporting tools, but your infrastructure needs to support log retention and analysis. Storage requirements vary based on your network size, but plan for at least 500GB dedicated to security logs if you're serious about compliance.

Pre-Implementation Assessment

Before we schedule anything, we conduct a thorough review of your current setup. This isn't a sales call – it's a technical discovery session where we map out your network topology, identify potential conflicts, and plan the migration path.

We've learned the hard way that assumptions break things. So we document everything, test connectivity paths, and identify any custom configurations that need special handling.

Timeline Note:

Assessment appointments are currently being scheduled for autumn 2025. Plan for a half-day on-site visit or remote session, depending on your location relative to our Southampton office.

Ongoing Support Requirements

Security isn't something you set up once and forget. Your team (or ours, if we're managing it) needs to monitor alerts, apply firmware updates, and adjust rules as your business changes.

You'll want someone on your staff who understands basic networking concepts – subnet masks, routing tables, firewall rules. If you don't have that person, we can handle it, but that shifts the relationship from implementation to managed services.

Training Available:

We offer quarterly training sessions for IT staff covering firewall administration, security best practices, and incident response. Next session: February 2026.

Ready to Discuss Your Specific Setup?

Every network is different. What we've outlined here covers the common scenarios, but your environment might have unique requirements. Let's talk through your infrastructure and figure out exactly what you need.

Get in Touch About Requirements