Security Advisory Services - Logicalis · We are proud to offer a wide array of security advisory...

2
Security has moved beyond IT and is now a major business concern. “Script Kiddies” and vandals have been replaced by well-funded criminal networks that work around the clock to identify and exploit weaknesses in any company they can find. Direct attacks to vulnerable software have been augmented by long-term advanced persistent threats that target the weakest link of an organisation - its employees. Thus, it is more important now than ever, that business leaders take a proactive position on the technologies and polices that protect their business. Logicalis is able to help by providing expert guidance. Our consultants offer a holistic approach that reviews every aspect of security. From device audits and configuration reviews to vulnerability scanning and policy review, Logicalis is able to share its wealth of experience in order to help you face emerging cyber security threats confidently. We are proud to offer a wide array of security advisory services including: Device hardening and Firewall Policy Review Logicalis conducts a deep dive on devices within an organisation’s network. Consultants will measure device configurations against corporate policies and international hardening guides to identify and eliminate any risky configurations. • Standard, secure baseline configurations for end-point users. • Simplified and secure firewall rules and policies. Security Advisory Services • Data Loss Prevention (DLP) • Device Control • Application Control • Change Control • Security Awareness Training • Online Training • Security Consultancy • VirusScan Enterprise (VSE) • Nitro • Splunk What we offer: Data Loss Prevention Security Awareness Anti-Virus Security Incident & Event Management (SIEM) Network Vulnerability Assessment Using a combination of automated tools and manual techniques, Logicalis scans corporate networks to identify vulnerable machines, incorrect network segmentation, and rogue devices. Consultants will work with management to review the findings and provide a recommended course for corrective action. • Ad-hoc and continuous vulnerability management. • Validate that patch policy is being followed. • Detect and locate unauthorised devices and access points. • Uncover rogue access points and other unauthorised devices. Policy Review Information security is everybody’s responsibility and it starts with robust policies. More often than not, organisations will blindly add new security procedures as threats emerge. Without a strategic approach, this results in overlaps and inefficiencies or worse, inconsistent protection within an organisation. Logicalis can help by consolidating business needs, regulatory requirements, and best practices into a comprehensive information security framework. • Develop a security management system that is appropriate for your organisation. • Establish clear-cut standard operating procedures to guide your employees. • Reduce cost through implementing policies and controls that provide just the right amount of protection for an asset. • Online Cloud Backup Services • Endpoint Encryption for PC/Laptop/Mac • File and Folder • Web Filtering • Email Filtering • Database Security • Penetration Testing • Vulnerability Management Managed Backup Encryption Threat Protection Our IT security services provide protection across the network, safeguarding the perimeter, critical internal assets, data, remote users, customers and partners. Our security team can be deployed to simply back up your existing security staff, monitor devices, raise alerts if necessary, or we can, through our portfolio of Managed Security Services, actively manage your security environment.

Transcript of Security Advisory Services - Logicalis · We are proud to offer a wide array of security advisory...

Page 1: Security Advisory Services - Logicalis · We are proud to offer a wide array of security advisory services including: Device hardening and Firewall Policy Review Logicalis conducts

Security has moved beyond IT and is now a major business concern. “Script Kiddies” and vandals have been replaced by well-funded criminal networks that work around the clock to identify and exploit weaknesses in any company they can find. Direct attacks to vulnerable software have been augmented by long-term advanced persistent threats that target the weakest link of an organisation - its employees. Thus, it is more important now than ever, that business leaders take a proactive position on the technologies and polices that protect their business.

Logicalis is able to help by providing expert guidance. Our consultants offer a holistic approach that reviews every aspect of security. From device audits and configuration reviews to vulnerability scanning and policy review, Logicalis is able to share its wealth of experience in order to help you face emerging cyber security threats confidently. We are proud to offer a wide array of security advisory services including:

Device hardening and Firewall Policy ReviewLogicalis conducts a deep dive on devices within an organisation’s network. Consultants will measure device configurations against corporate policies and international hardening guides to identify and eliminate any risky configurations. • Standard,securebaselineconfigurationsfor

end-point users.• Simplifiedandsecurefirewallrulesandpolicies.

Security Advisory Services

•DataLossPrevention(DLP)•DeviceControl•ApplicationControl•ChangeControl

•SecurityAwarenessTraining•OnlineTraining•SecurityConsultancy

•VirusScanEnterprise(VSE)

•Nitro•Splunk

What we offer:

Data Loss Prevention

Security AwarenessAnti-Virus

Security Incident & Event Management (SIEM)

Network Vulnerability Assessment Using a combination of automated tools and manual techniques, Logicalis scans corporate networks to identify vulnerable machines, incorrect network segmentation, and rogue devices. Consultants will work with management to review the findings and provide a recommended course for corrective action. • Ad-hocandcontinuousvulnerabilitymanagement.• Validatethatpatchpolicyisbeingfollowed.• Detectandlocateunauthoriseddevicesandaccesspoints.• Uncoverrogueaccesspointsandother

unauthorised devices.

Policy ReviewInformation security is everybody’s responsibility and it starts with robust policies. More often than not, organisations will blindly add new security procedures as threats emerge. Without a strategic approach, this results in overlaps and inefficiencies or worse, inconsistent protection within an organisation.

Logicalis can help by consolidating business needs, regulatory requirements, and best practices into a comprehensive information security framework.• Developasecuritymanagementsystemthatisappropriate

for your organisation.• Establishclear-cutstandardoperatingprocedurestoguide

your employees.• Reducecostthroughimplementingpoliciesandcontrols

that provide just the right amount of protection for an asset.

•OnlineCloudBackupServices

•EndpointEncryptionforPC/Laptop/Mac•FileandFolder

•WebFiltering•EmailFiltering•DatabaseSecurity•PenetrationTesting•VulnerabilityManagement

Managed Backup

Encryption Threat Protection

Our IT security services provide protection across the network, safeguarding the perimeter, critical internal assets, data, remote users, customers and partners. Our security team can be deployed to simply back up your existing security staff, monitor devices, raise alerts if necessary, or we can, through our portfolio of Managed Security Services, actively manage your security environment.

Page 2: Security Advisory Services - Logicalis · We are proud to offer a wide array of security advisory services including: Device hardening and Firewall Policy Review Logicalis conducts

•ManagedMDM•iPhone•iPad•Android•Windows

•IPSapplication(IDS/IPS)•HostIPS(HIPS)•Sourcefire(Cisco)

•PhysicalKey-ringTokens•MobilePhoneTokens•SMSTokens•SoftTokens

•ApplicationPatchManagement•PatchImpactAnalysis•WindowsPatchManagement

•Scanning•Reporting

•CiscoASA•PaloAltoNetworks•Fortinet

Mobile Device Management

Managed Intrusion Prevention

Two-Factor Authentication

Patch Management

Security Monitoring

Managed Firewalls

The Managed Security Service (MSS) SOC is a secure service that allows you to easily monitor the security of your systems without your organisation having to build out the same capability.

Security is becoming more and more established in the corporate structure – it is no longer acceptable for security to be a secondary function of an IT department. To address this challenge, organisations are investing in Security Operations Centres(SOCs)toprovideincreasedsecurityandrapidresponsetoeventsthroughouttheirnetworks.

Logicalis’ MSS SOC combines MSS security research with service-level data from monitored devices across your networks to help you manage vulnerabilities discovered in you systems.

•ISO27001-certifiedSOCfacility.•Real-timeintegrationoffunctionalityandresearchthatprovidesinteractivecontent,dailyassessmentand

proactive vulnerability notifications, alerts and advisories, detailed trend analysis and attack metric reporting.•Easy-to-read,business-focusedreportswithcustomisableviewsofactivityattheenterprise,workgroup

and device levels.•Supporton-demandwithreal-time,interactivecommunications,securityincidentsandticketdata.

Our dedicated security professionals work in a tightly intergrated and commited team that is certified and trained in security disciplines and methodologies. We manage and monitor security incidents so that you don’t have to.

Security Operations Centre (SOC) Monitor the Security of your Systems

About the Team

What can we do for your organisation?Contact Logicalis to find out how we can help you realise the benefits of smart IT solutions. Visitusatwww.ap.logicalis.comoremailusat [email protected].