Cyber Security
.jpg)
Cyber security Overview
Security Consulting Services
- Security Maturity Assessment
- Security Risk and Gap Assessment
- Remediation Recommendations
- Security Policies, Standards and Procedures
- Enterprise IT Security Implementation Planning
- Security Operations Management
End User Services
- Trusted Anti-Malware Protection
- Remote Deployments – Application Whitelisting and Blacklisting
- Continuous Monitoring of End User Devices
- Mobile Device Management
- Social Engineering and Advisory Services
- Device Hardening and Data Leak Prevention
Security Operations Management
- Security Operations Center
- Security Event Management and Incident Response
- Monitoring, Compliance and Reporting
- Incident Response and Remediation
- Identity and Access Management
Network and Server Security Services
- Stateful, Application, Circuit Firewalls and NexZen Firewalls.
- Intrusion Detection System\Intrusion Prevention Systems (IDS\IPS) – Network and Host Based
- Network Architecture Including DMZ, VPNs and Remote Connectivity
- Integration of Networks into Enterprise Security Operations
- Access Control Management and Password Protection
- Server Hardening and Patch Management
- Encryption of data at Rest and Motion
- Planning and Management of Backups
- Disaster Recovery and Business Continuity Planning
Email Security
- Spam Filtering and URL Protection
- Automated Email Content Review and Filtering
- Email Encryption and Confidentiality Management
- Deployment and Management of Secure Email Gateways