Cybersecurity from Digital Lock and Key Experts

You are now under digital lock and key security. Global corporate level data protection from cyberthreats 365 days a year. Lockdown and market.

lockdown home image

Lockdown Market mission is to leverage for you the power of cutting-edge artificial intelligence to provide comprehensive cyber security services designed and built to protect your business from the ever-evolving threat landscape. We work to safeguard your digital assets, ensuring that business operations remain secure and resilient against cyber-attacks, whilst you stay locked in securely and connected globally.

Our vision is cybersecurity business services 365 days a year.

What are our core services? Find out who we are, visit linkedin and contact us today.

Smart IOT Devices

Secure Software Solutions

Secure Hardware Solutions

Cybersecurity Training Offer

If you're looking to further your digital security education. You have come to right place. Sign up for one and one training*.

two women engaged in cybersecurity training

*one offer per persons

Cyber security as a service CSaaS the answer and comprehensive solution to the highly complex world of cyber security. Choice from our basic, standard or enterprise cyber security service plan.

Cybersecurity News

Connecting Security Zones: Enhancing Network Segmentation

Network segmentation is a fundamental security practice that reduces the attack surface and improves traffic control. Security zones help define boundaries within a network, ensuring that sensitive data remains protected while allowing necessary communication.

Firewall Authentication and Authorisation

Administrator Accounts And Roles

Authenticate local or remote

Admin account assigned a role with privileges  

Administrator actions logged in config and system logs Monitor>Logs

Only the predefined admin account has access to the firewall. add administrator accounts for delegation and auditing purpose.

PAN-OS OS for local or ...supported Authentication/authorisation and accounting Services like active directory, LDAP, RADIUS, SAML.

XML config or database

Configuration Management

The purpose of the running and candidate firewall configurations

Running Configuration
• Configuration settings currently active on the firewall (maintained in a file on the firewall named running config.xml)

Candidate Configuration
•Configuration changes in progress but not active on the firewall (all of in progress edits are made to the candidate configuration)