Managed IT Services
Managed IT Services provides third-party monitoring and maintaining of computers, networks and software. The actual equipment may be inhouse or at the third-party’s facilities, but the “managed” implies an ongoing effort; for example, making sure the equipment is running at a certain quality level or keeping the software up-to-date.
Many companies are seeing the benefit of “outsourcing” non critical applications and management of equipment/servers so they can focus on their mission and their goals.
Managed Security
In computing, managed security services (MSS) are network security services that have been outsourced to a service provider.
On-site Risk Analysis
This is customized assistance in the assessment of business risks, key business requirements for security and the development of security policies and processes. It may include comprehensive security architecture assessments and design (include technology, business risks, technical risks and procedures). Our analysis may also include security product integration and On-site mitigation support after an intrusion has occurred, including emergency incident response and forensic analysis
Managed Endpoint Detection and Response
This service involves installing, upgrading, and managing the firewall, Virtual Private Network (VPN) and/or intrusion detection hardware and software, electronic mail, and commonly performing configuration changes on behalf of the customer.
Management includes monitoring, maintaining the firewall’s traffic routing rules, and generating regular traffic and management reports to the customer. Intrusion detection management, either at the network level or at the individual host level, involves providing intrusion alerts to a customer, keeping up to date with new defenses against intrusion, and regularly reporting on intrusion attempts and activity. Content filtering services may be provided by; such as, email filtering) and other data traffic filtering.
Managed Security Monitoring
This is the day-to-day monitoring and interpretation of important system events throughout the network—including unauthorized behavior, malicious hacks, denial of service (DoS), anomalies, and trend analysis. It is the first step in an incident response process.
Penetration Testing and Vulnerability Assessments
This includes one-time or periodic software scans or hacking attempts in order to find vulnerabilities in a technical and logical perimeter. It generally does not assess security throughout the network, nor does it accurately reflect personnel-related exposures due to disgruntled employees, social engineering, etc. Regularly, reports are given to the client to ensure that security protections are effective
Compliance Monitoring
This includes monitoring event logs not for intrusions, but change management. This service will identify changes to a system that violate a formal security policy for example, if a rogue administrator grants himself or herself too much access to a system. In short, it measures compliance to a technical risk model.
Hosting
Locating customer equipment in a third-party datacenter can be a daunting task and having the expertise to differentiate the various options can be a valuable asset
Colocation often refers to Internet service providers (ISPs) or cloud computing providers that furnish the floor space, electrical power and high-speed links to the Internet for a customer’s servers. Colocation eliminates having to build a secure facility that provides power and air conditioning for company-owned servers. In addition, colocation centers are often located near major Internet connecting points and can provide access to multiple Tier 1 Internet backbones. Although most equipment monitoring is performed remotely by the customer, many colocation datacenters offer equipment maintenance and troubleshooting arrangements.