WELCOME TO PCMG! | Request an eQuote



For contract & open market purchases, please call 800-625-5468, or click here to register/logon to your Business Direct Pricing Portal!

Select your Contract

For help with Federal, State & Local Goverment or Education contracts, or your PCMG Business Direct go to:

or Call 1-800-625-6568

Network security is designed to protect the usability and integrity of the network and data in motion. Effective network security manages access by targeting a variety of threats and prevents them from entering or spreading across your network. PCM’s network security solutions can range from multiple layers of network access management to traffic monitoring and machine learning-driven analytics.

Network Access Control
Network Access Control do exactly what the name implies—control access to a network with policies that includes pre-admission endpoint security policy checks and post-admission controls for tracking users and their devices through the breadth of the network.

Our Network Access Control solutions use a set of protocols to define and implement policies to describe how devices can access network nodes. Such a solution can also be integrated with an automatic remediation process for fixing non-compliant nodes before allowing access. This allows network infrastructure, such as routers, switches, firewalls, to work in-sync with backend servers and end user computing equipment. It ensures the information system is operating securely before interoperability is allowed.

Identity and Access Management
Identity and Access Management (IAM) is the security and business discipline that enables authorized users to access the right resources at the right times for the right reasons. Our solution addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments while meeting rigorous compliance requirements.

Privileged Access Management
A privileged access management system controls access to login accounts that have elevated security rights. It typically controls access to administrator IDs, service accounts, and accounts used by one system to sign into another.

Our Privileged Identity Management (PIM) solutions is a subset of PCM’s identity management practice. It focuses on the special requirements of powerful accounts within the IT infrastructure of an enterprise, and frequently used as an information security and governance tool – helping companies meet compliance regulations and prevent internal data breaches through the use of privileged accounts.

Virtual Private Networks
A virtual private network (VPN) extends a private network across a public network. This enables users to send and receive data across shared or public networks in a manner similar to connecting computing devices to a private network. Applications running across the VPN can therefore benefit from functionalities, securities, and management capabilities that PCM solutions provide.

Network Visibility and Analytics
Network Visibility and Analytics technology correlates network traffic data from a variety of data communication vehicles for network visibility, enabling better cyber security and IP services. With ongoing changes in communications networks and how information can be exchanged, people and/or machines can communicate in multiple ways – FTP, Webmail, VoIP, instant messaging, online chat, blogs, social networks – and from different access points via desktops, laptops and mobile devices.

PCM’s solutions provide the means to quickly identify, examine and correlate interactions involving Internet users, applications, and protocols. The technology enables a global understanding of network traffic for applications that need to correlate information such as who contacts whom, when, where and how, or who accesses what database and when.

Wide Area Network Security
A wide area network (WAN) is a telecommunications network or computer network that extends over a large geographical distance. WAN’s are often established with leased, cloud or private telecommunication circuits.

Thank you for submitting your information.

Contact Us!

* Indicates required fields.

† We may require account set up and/or phone contact to verify legitimacy of request.

For more PCM-Security information, CLICK HERE.

More than an IT Provider - We’re Your Technology Partner!

Since 2002, PCM-G has been a leading provider of IT products, services, and solutions to government agencies, educational institutions, and healthcare facilities. We provide access to over 300,000 IT products like tablets, laptopsdesktops, servers, storage, and networking from leading manufacturers like Cisco, HPI, Apple, Adobe, Lenovo and Microsoft. With powerful eProcurement tools, comprehensive software licensing solutions and dedicated Account Executives, it's easy to get exactly what you need to tackle your technical challenges.

In addition, we offer world class procurement and logistics, IT consulting, and implementation services delivered through over 1200 technical professionals. Whether you want to deploy tablets securely or move your data center to the cloud, PCM-G is here to make it happen. Our Services experts will collaborate with you to understand your requirements and provide tailored services to allow your organization to lower costs, increase agility, improve efficiency and succeed in today's global economy and beyond.

Our Company


We Provide

About Us
Privacy Policy
Tech Journal
Site Map
Terms of Use and Sale
Why PCM-G?
Catalog Subscriptions
Contact Us
Email Subscriptions
My Account
Order Status
Product Recalls
We proudly welcome American Express® Cards

13755 Sunrise Valley Drive, Suite 750, Herndon, VA 20171
1-800-625-5468 | © 2016 PCM-G, Inc.


Embedded Elouqua Script