Managed Intrusion Detection/Prevention System
♦ – IDS and IPS services use sensors deployed in your facilities to monitor network traffic for suspicious and malicious packets.
Unified Threat Management
♦ – Managed Firewall, Anti-Virus, VPN, Web Content Filtering and Intrusion Prevention.
Managed External/Internal Vulnerability Scanning
♦ – External Vulnerability Scanning (EVS) and Internal Vulnerability Scanning (IVS) provide you with vulnerability reports concerning both their publicly-exposed and internal servers and applications. EVS scans are a cloud based solution, while IVS scans require that a scanner appliance be deployed to your network.
Managed Web Application Firewall
♦ – Protect web-based applications from attacks. Integrated intelligence ensures that known-good traffic is allowed through to the protected applications, as well as “negative security,” in which signatures are used to detect known bad traffic. Able to track requests to responses, and outbound responses are checked for suspicious content.
Managed Network Access Control
♦ – Our NAC solution is designed to provide Enterprise networks with control over Laptops, Workstations, Servers and other network devices which are added to their network. The NAC product is able to provide authentication and security compliance testing prior to allowing a new device to operate on a network.
Managed Email Security
♦ – Our in-the-cloud email security service, designed to stop, spam, e-mail borne viruses, Trojan Horses, and, whenever possible, identity theft schemes. Unique custom block filters allow clients to scan for critical data such as social security numbers and credit card numbers from leaking from the company.
Managed System Incident and Event Management
♦ – Managed SIEM service utilizes 24×7 Security Operations Center, which combines people, process and technology to deliver analysis and reporting of log data from a wide variety of data sources, including network and security products, servers, workstations, and custom applications.
♦ – Focuses exclusively on stopping availability threats such as DDoS. Organizations can deploy our system in front of services to stop application-layer attacks and disrupt botnet communications.