top of page

Managed Security

SERVICES

  • Pen Test - an attempt to gain access to a network or application via simulated attack; often required for compliance such as PCI

  • Risk Assessment - the practice of evaluating an organization’s or IT environment’s current security posture with suggested recommendations for improvement; often performed in reference to a specific security standard or compliance regulation

  • Managed SIEM - a real-time, managed solution for Security Information & Event Management, designed to provide a holistic view of a customer’s environment and correlate various data sources to identify threats

  • DDoS Mitigation - a solution designed to block Distributed Denial of Service attacks from taking down a network or online application; especially relevant for businesses that do business online

  • Access Control - a technique to regulate who or what can use resources or applications on a network; can include Single Sign-On and Identity Access Management

  • Perimeter Security - a broad approach to fortify the boundaries of a network; may include firewalls, Virtual Private Networks, intrusion detection, and intrusion prevention.

  • Endpoint Protection - a unified solution to protect desktops, laptops, and mobile devices; features include anti-virus, anti-spyware, and personal firewall

  • Incident Response - an organized, forensic approach to investigate and remediate a security breach; can be on-demand or via a monthly retainer

 

KEY PROVIDERS 

  • Alert logic

  • AT&T

  • Armor

  • CATO

  • Cyxtera

  • Flexential

  • Masergy

  • Trustwave

  • Verizon

bottom of page