Security Advisory Services - Logicalis · We are proud to offer a wide array of security advisory...
Transcript of Security Advisory Services - Logicalis · We are proud to offer a wide array of security advisory...
Security has moved beyond IT and is now a major business concern. “Script Kiddies” and vandals have been replaced by well-funded criminal networks that work around the clock to identify and exploit weaknesses in any company they can find. Direct attacks to vulnerable software have been augmented by long-term advanced persistent threats that target the weakest link of an organisation - its employees. Thus, it is more important now than ever, that business leaders take a proactive position on the technologies and polices that protect their business.
Logicalis is able to help by providing expert guidance. Our consultants offer a holistic approach that reviews every aspect of security. From device audits and configuration reviews to vulnerability scanning and policy review, Logicalis is able to share its wealth of experience in order to help you face emerging cyber security threats confidently. We are proud to offer a wide array of security advisory services including:
Device hardening and Firewall Policy ReviewLogicalis conducts a deep dive on devices within an organisation’s network. Consultants will measure device configurations against corporate policies and international hardening guides to identify and eliminate any risky configurations. • Standard,securebaselineconfigurationsfor
end-point users.• Simplifiedandsecurefirewallrulesandpolicies.
Security Advisory Services
•DataLossPrevention(DLP)•DeviceControl•ApplicationControl•ChangeControl
•SecurityAwarenessTraining•OnlineTraining•SecurityConsultancy
•VirusScanEnterprise(VSE)
•Nitro•Splunk
What we offer:
Data Loss Prevention
Security AwarenessAnti-Virus
Security Incident & Event Management (SIEM)
Network Vulnerability Assessment Using a combination of automated tools and manual techniques, Logicalis scans corporate networks to identify vulnerable machines, incorrect network segmentation, and rogue devices. Consultants will work with management to review the findings and provide a recommended course for corrective action. • Ad-hocandcontinuousvulnerabilitymanagement.• Validatethatpatchpolicyisbeingfollowed.• Detectandlocateunauthoriseddevicesandaccesspoints.• Uncoverrogueaccesspointsandother
unauthorised devices.
Policy ReviewInformation security is everybody’s responsibility and it starts with robust policies. More often than not, organisations will blindly add new security procedures as threats emerge. Without a strategic approach, this results in overlaps and inefficiencies or worse, inconsistent protection within an organisation.
Logicalis can help by consolidating business needs, regulatory requirements, and best practices into a comprehensive information security framework.• Developasecuritymanagementsystemthatisappropriate
for your organisation.• Establishclear-cutstandardoperatingprocedurestoguide
your employees.• Reducecostthroughimplementingpoliciesandcontrols
that provide just the right amount of protection for an asset.
•OnlineCloudBackupServices
•EndpointEncryptionforPC/Laptop/Mac•FileandFolder
•WebFiltering•EmailFiltering•DatabaseSecurity•PenetrationTesting•VulnerabilityManagement
Managed Backup
Encryption Threat Protection
Our IT security services provide protection across the network, safeguarding the perimeter, critical internal assets, data, remote users, customers and partners. Our security team can be deployed to simply back up your existing security staff, monitor devices, raise alerts if necessary, or we can, through our portfolio of Managed Security Services, actively manage your security environment.
•ManagedMDM•iPhone•iPad•Android•Windows
•IPSapplication(IDS/IPS)•HostIPS(HIPS)•Sourcefire(Cisco)
•PhysicalKey-ringTokens•MobilePhoneTokens•SMSTokens•SoftTokens
•ApplicationPatchManagement•PatchImpactAnalysis•WindowsPatchManagement
•Scanning•Reporting
•CiscoASA•PaloAltoNetworks•Fortinet
Mobile Device Management
Managed Intrusion Prevention
Two-Factor Authentication
Patch Management
Security Monitoring
Managed Firewalls
The Managed Security Service (MSS) SOC is a secure service that allows you to easily monitor the security of your systems without your organisation having to build out the same capability.
Security is becoming more and more established in the corporate structure – it is no longer acceptable for security to be a secondary function of an IT department. To address this challenge, organisations are investing in Security Operations Centres(SOCs)toprovideincreasedsecurityandrapidresponsetoeventsthroughouttheirnetworks.
Logicalis’ MSS SOC combines MSS security research with service-level data from monitored devices across your networks to help you manage vulnerabilities discovered in you systems.
•ISO27001-certifiedSOCfacility.•Real-timeintegrationoffunctionalityandresearchthatprovidesinteractivecontent,dailyassessmentand
proactive vulnerability notifications, alerts and advisories, detailed trend analysis and attack metric reporting.•Easy-to-read,business-focusedreportswithcustomisableviewsofactivityattheenterprise,workgroup
and device levels.•Supporton-demandwithreal-time,interactivecommunications,securityincidentsandticketdata.
Our dedicated security professionals work in a tightly intergrated and commited team that is certified and trained in security disciplines and methodologies. We manage and monitor security incidents so that you don’t have to.
Security Operations Centre (SOC) Monitor the Security of your Systems
About the Team
What can we do for your organisation?Contact Logicalis to find out how we can help you realise the benefits of smart IT solutions. Visitusatwww.ap.logicalis.comoremailusat [email protected].