Managed Intrusion Detection System

Managed Intrusion Detection System


Managed Intrusion Detection - Prevention Systems



> Save time and money while reducing your burden

> Combined technology – expertise – global intelligence




Meet PCI, HIPAA, and GLBA compliance requirements at a fraction of the cost of staffing your own team of analysts.

Enlist a team of expert threat analysts who monitors your networks and endpoints 24x7, applying the latest intelligence and methodologies to look for signs of compromise. When a potential compromise is detected, the team performs an in-depth analysis on affected systems to confirm the attack.




Benefits


Detect, identify, alert and protect your organisation from threats such as:


  • Worms

  • Spyware

  • Peer to peer (P2P)

  • Denial of service (DoS) and distributed denial of service (DDoS)

  • Botnets


  • Targeted attacks against Web applications

  • Proprietary or sensitive data leaving the network

  • Cross-site scripting

  • SQL injection

  • Buffer overflow

  • Web directory traversal



> Discovers changes to the infrastructure



> Client Side Application Protection

Protects end users against attacks that target applications used every day. 



> Advanced Network Protection


Advanced intrusion prevention including DNS protection. 



> Data Security and Loss Prevention

Monitoring and identification of unencrypted data. 



> Web Application Security

Protection for cloud-based apps, web apps, web 2.0 and databases. 



> Application Control

Reclaim bandwidth and block peer-to-peer and tunneling protocols. 






Service Features


Transparent

The service operates transparently to the user and therefore it does not require any reconfiguration of the existing network to which it connects.


24/7 technical support

Around the clock support, staffed with security experts who have in-depth knowledge and experience working with complex network environments for highly distributed environments.



Security professionals


Experienced security professionals serve as an extension of your security team, providing recommendations and expert guidance as needed at no additional cost to your organisation.


Resolutions, not alert bombardments

Analysts leverage system and network forensics on live systems to investigate, classify, and analyse the risk in real time. Detailed reports on exactly what happened and recommendations on how to contain the threat are immediately provided. 

 

Incident response

Quickly engage expert incident responders, when needed, to investigate breaches, re-secure your network, remediate technical damage and assess the business impact so you can make prompt and accurate disclosure, if necessary.



Virtual intrusion detection sensors

Where network sensors (small appliances or software that can be installed on standard servers or VMs that continuously monitor network traffic through switch span ports) are placed on the customer network / data centres for intrusion detection/ traffic analysis. These sensors interact with an engine that is hosted by the service provider and is accessed through SSL-encrypted connections, providing complete protection of the customer’s confidential information. 





Log and audit


Safely stored event logs in SSAE 16 audited, redundant data centres.


  • Configuration changes
  • Policy requests
  • Help desk tickets
  • Support from our expert SOC staff
  • Device provisioning and deployment
  • Performance and availability management
  • Device upgrades and patch management
 
  • Policy and signature management
  • Real-time threat monitoring and response
  • Integrated Counter Threat Unit intelligence
  • On-demand security and compliance reporting
  • Flexible co-management options
  • Unlimited and unmetered expert support
  • Auditable and accurate change management
  • Enterprise class backup and recovery


Customisable reporting


Compliance requirement management with reports by device, group, or site. 


Device flexibility


Virtually eliminates per-device restrictions when modifying configurations so change requests can be pooled across multiple devices. 


Vendor-neutral approach


Works with a wide range of devices and virtual private networks to optimise your existing security investments.