Managed Intrusion Detection - Prevention Systems
> Save time and money while reducing your burden
> Combined technology – expertise – global intelligence
Meet PCI, HIPAA, and GLBA compliance requirements at a fraction of the cost of staffing your own team of analysts.
Enlist a team of expert threat analysts who monitors your networks and endpoints 24x7, applying the latest intelligence and methodologies to look for signs of compromise. When a potential compromise is detected, the team performs an in-depth analysis on affected systems to confirm the attack.
Benefits
Detect, identify, alert and protect your organisation from threats such as:
|
|
> Discovers changes to the infrastructure
> Client Side Application Protection
Protects end users against attacks that target applications used every day.> Advanced Network Protection
Advanced intrusion prevention including DNS protection.
> Data Security and Loss Prevention
Monitoring and identification of unencrypted data.> Web Application Security
Protection for cloud-based apps, web apps, web 2.0 and databases.> Application Control
Reclaim bandwidth and block peer-to-peer and tunneling protocols.Service Features
Transparent
The service operates transparently to the user and therefore it does not require any reconfiguration of the existing network to which it connects.24/7 technical support
Around the clock support, staffed with security experts who have in-depth knowledge and experience working with complex network environments for highly distributed environments.Security professionals
Experienced security professionals serve as an extension of your security team, providing recommendations and expert guidance as needed at no additional cost to your organisation.
Resolutions, not alert bombardments
Analysts leverage system and network forensics on live systems to investigate, classify, and analyse the risk in real time. Detailed reports on exactly what happened and recommendations on how to contain the threat are immediately provided.Incident response
Quickly engage expert incident responders, when needed, to investigate breaches, re-secure your network, remediate technical damage and assess the business impact so you can make prompt and accurate disclosure, if necessary.Virtual intrusion detection sensors
Where network sensors (small appliances or software that can be installed on standard servers or VMs that continuously monitor network traffic through switch span ports) are placed on the customer network / data centres for intrusion detection/ traffic analysis. These sensors interact with an engine that is hosted by the service provider and is accessed through SSL-encrypted connections, providing complete protection of the customer’s confidential information.Log and audit
Safely stored event logs in SSAE 16 audited, redundant data centres.
|
|
Customisable reporting
Compliance requirement management with reports by device, group, or site.
Device flexibility
Virtually eliminates per-device restrictions when modifying configurations so change requests can be pooled across multiple devices.
Vendor-neutral approach
Works with a wide range of devices and virtual private networks to optimise your existing security investments.