Firewalls, switches, wireless, segmentation, and SD-WAN for Atlanta-area commercial buildings — designed by a licensed Georgia low-voltage contractor that owns the structured cabling underneath, so the security stack runs on a network we built.
Most network-security work splits across two trades that never talk: a low-voltage contractor pulls the cable, an MSP plugs in a firewall, and the seams between them become the operational risk. JB Technologies delivers both in one engagement: structured cabling, FortiGate or SonicWall firewall, FortiSwitch or Netgear managed switches, FortiAP / SonicWave / Orbi Pro wireless, and segmentation that meets the audit regime your industry actually faces (HIPAA, PCI, SOC 2, OSHA / OT, CIPA, C-TPAT). We work across metro Atlanta — Buckhead and Midtown office, Cobb and Gwinnett industrial, North Fulton tech corridor, and the multifamily and healthcare campuses across the Southeast — and we own the design, the installation, and the lifecycle service so there is one number to call when the network goes sideways at 2am.
Each environment carries its own segmentation, throughput, and audit profile; the design starts there.
Identical FortiGate or TZ template per site, central FortiManager / NSM, PCI segmentation, Wi-Fi guest separation, and SD-WAN over dual ISPs.
HIPAA-aligned VLAN segmentation between EMR, medical IoT, guest, and admin networks; DPI-SSL where the BAA permits.
OT/IT separation between Modbus / BACnet / SCADA and the carpeted side; engineered around the plant's actual MES and ERP traffic.
Per-tenant VLANs and SSIDs, isolated common-area Wi-Fi, and tenant-billable usage reporting from FortiManager or Capture Security Center.
CIPA web filtering, E-rate-eligible firewall and switch hardware, Aruba/Cisco-equivalent FortiSwitch deployments, and BYOD captive portals.
Netgear AV-Line switches preconfigured for Dante / NDI / SDVoE / AES67 multicast, kept on a network plane separate from corporate IT.
FortiGate (40F through 9000-series) and SonicWall (TZ / NSa) sized against actual DPI-SSL throughput, not marketing speed; HA failover where uptime warrants.
FortiSwitch and Netgear M4250 / M4350 / M4500 managed PoE / PoE+ / PoE++ switches sized for cameras, access points, VoIP, and AV; AV-Line preconfigured for multicast.
FortiAP, SonicWave, and Orbi Pro deployments with per-tenant SSID isolation, captive portal, RADIUS / 802.1X, and rogue-AP detection.
VLAN architecture for HIPAA / PCI / OT / guest, FortiGate Secure SD-WAN over dual ISPs, IPsec / SSL VPN, and zero-trust access via FortiSASE / Cloud Edge.
FortiManager / FortiAnalyzer, SonicWall NSM / Capture Security Center, Netgear Insight cloud — single-pane policy, log retention, and reporting across multi-site portfolios.
FortiClient / FortiEDR and SonicWall Capture Client / Capture ATP / SonicWall MDR layered onto the firewall so the perimeter, endpoint, and SOC are one stack.
Network security is judged by audit and incident response, not spec-sheet throughput. Designs map onto whichever combination applies to your site.
NIST Cybersecurity Framework controls and SOC 2 trust services criteria mapped to firewall, segmentation, and logging design — with the artifacts your auditor wants.
HIPAA Security Rule §164.312 audit / access controls; PCI-DSS network-segmentation testing; FERPA-aligned student-data handling on K-12 and higher-ed networks.
29 CFR 1910 considerations for OT-segmented networks, ISO 28000 supply-chain security, and C-TPAT video / access integration with the network plane.
We pull the Cat6A, terminate the patch panel, install the FortiSwitch, configure the firewall, and document the run. No contractor finger-pointing when something fails.
FortiGate and SonicWall models picked against actual DPI-SSL load; Netgear AV-Line vs. general managed switch picked against actual multicast traffic.
Trucks roll for hardware swaps, RMA replacements, and on-site cutovers across metro Atlanta and the Southeast — not a remote-only MSP.
Native segmentation for the systems we already install: Verkada / Hanwha / Turing video, Brivo / Verkada access control, ButterflyMX intercoms, Q-SYS AV.
Inventory existing circuits, switches, APs, endpoints, and applications across every site; document the audit regime, throughput targets, and segmentation requirements.
VLAN plan, IP schema, SD-WAN underlay/overlay, FortiAP / SonicWave heatmaps, switch port maps, FortiGate / TZ HA topology, and license selection.
Pre-staged in our Atlanta shop with base config / FortiManager / NSM templates, scheduled cutover with minimal downtime, structured cabling and PoE verification.
As-builts, FortiManager ADOM / NSM tenant baseline, runbook, and ongoing firmware / license / policy management with optional 24/7 MDR.
SonicWall is our default for SMB and small-mid-market sites where simpler policy, lower license cost, and Capture Client are the right fit. FortiGate is the call for larger or more complex sites where the Security Fabric (FortiSwitch + FortiAP + FortiSASE + FortiAnalyzer) buys you a lot more than the firewall alone. We size both against your real DPI-SSL throughput, not the box vendor's headline number.
It mostly doesn't — it sits beside it. AV-over-IP (Dante, NDI, SDVoE, AES67) is multicast-heavy and timing-sensitive. We deploy Netgear AV-Line switches on a separate VLAN (or separate switch fabric) so the AV media stays clean and the corporate / security networks stay segmented per audit regime.
Yes — we design segmentation against the actual Security Rule (HIPAA) or DSS-Req-1 (PCI) controls, document VLANs / firewall rules / data flows, and hand the artifact to your auditor. We do not represent ourselves as the auditor; we provide the network artifacts the auditor will ask for.
We segment Modbus / BACnet / Profinet / SCADA traffic onto an OT VLAN that is firewalled from the carpeted side, with a hardened bridge for whatever middleware needs to pass between (historian, MES, SAP). The audit log captures every cross-zone transit so an OT incident can be reconstructed.
Both work. SonicWall MDR and FortiAnalyzer-based managed detection are available as bolt-ons. If you already have a SOC or MSP, we hand off cleanly with documented log forwarding (FortiAnalyzer / NSM / Insight to your SIEM). We are not trying to displace a working MSP relationship.
A single-site firewall + switch + Wi-Fi refresh runs about 4-6 weeks from contract to cutover, including procurement, structured cabling work, and the cutover window itself. Multi-site rollouts are sized around your operational calendar — we have done 50+ site rollouts over a quarter and we have done a single critical site over a single weekend.
New construction, expansion, retrofit, or refresh — we will scope the right firewall, switch, wireless, and segmentation plan.
Get a Quote