Cyber Security

Cyber security Overview

Security Consulting Services

  • Security Maturity Assessment
  • Security Risk and Gap Assessment
  • Remediation Recommendations
  • Security Policies, Standards and Procedures
  • Enterprise IT Security Implementation Planning
  • Security Operations Management

End User Services

  • Trusted Anti-Malware Protection
  • Remote Deployments – Application Whitelisting and Blacklisting
  • Continuous Monitoring of End User Devices
  • Mobile Device Management
  • Social Engineering and Advisory Services
  • Device Hardening and Data Leak Prevention

Security Operations Management

  • Security Operations Center
  • Security Event Management and Incident Response  
  • Monitoring, Compliance and Reporting
  • Incident Response and Remediation
  • Identity and Access Management

Network and Server Security Services

  • Stateful, Application, Circuit Firewalls and NexZen Firewalls.
  • Intrusion Detection System\Intrusion Prevention Systems (IDS\IPS) – Network and Host Based
  • Network Architecture Including DMZ, VPNs and Remote Connectivity
  • Integration of Networks into Enterprise Security Operations
  • Access Control Management and Password Protection
  • Server Hardening and Patch Management
  • Encryption of data at Rest and Motion
  • Planning and Management of Backups
  • Disaster Recovery and Business Continuity Planning

Email Security

  • Spam Filtering and URL Protection
  • Automated Email Content Review and Filtering
  • Email Encryption and Confidentiality Management
  • Deployment and Management of Secure Email Gateways