Business with us always ensures high data security and integrity for our customer. Our organization strictly adheres to ISMS policies and implementing the controls over our infrastructure thru ISO. Our Security management solution is based on these set of services forming our Security Suite.

Vulnerability Management comprises of Identifying Vulnerabilities inside your Infrastructure, Patching those vulnerabilities and mitigating them for future course.

Firewall management involves Secreting logs out of your existing firewalls and analyzing those logs to identify anomalies. Also, rules configurations and updates as well as patches for the Firewalls comprise this exercise.

Network Monitoring involves agent based establishment across your infra where our sensors are set up at various identified entry points inside your infra and they gather necessary traffic data to manage and monitor your network by rules configuration and pattern detection.

Email Security involves setting up our proprietary email solutions for Spam filtering and IP identification

Intrusion Management and Analysis comprises of monitoring the traffic flowing inside your network and identifying and preventing or blocking malicious data packets as per our updated knowledge base inside the Intrusion Management System setup

Antivirus Management involves managing and monitoring as well as rules configuring the existing AV solutions.

All our services are governed by our SLAs to maintain the integrity of our services.

Vulnerability Management:

  • Security Audit
  • Regular and On-demand VA
  • Application audit
  • Network audit
  • Network Architecture audit
  • Network devices audit – Routers, Switches
  • Security devices audit – Firewalls, IDS, IPS
  • Server Audit
  • Linux and Windows based Web, Mail, Database, FTP, NFS, Authentication servers
  • Audit Reports & Recommendations
  • Finalize Patch Management Plan
  • Present Audit reports and recommendations
  • Categorize into critical, medium and low
  • Finalize Patch Management plan with Client
  • Prioritize patches based on
  • Vulnerability Criticality
  • Client’s business requirement
  • Ensure patches do not have side affects
  • Deploy patches in test environment
  • Roll out patches in live environment
  • Deployment of patches in test environment
  • Rollout of patches in live environment

Firewall Management and Analysis

  • Set-up and configuration (for new Firewall)
  • Management, Log analysis and reporting
  • Real-time threat monitoring
  • Threat detection
  • Creation of policies for threat prevention
  • Periodic revision of policies
  • Regular management summary reports
  • Routine configuration and management
  • Maintaining uptime as per SLA

Network Monitoring

  • Bandwidth and Traffic analysis
  • Top 10 websites visited Top 10 bandwidth users …
  • Monitoring of Servers, Devices, Applications
  • Server, device, application availability
  • Real-time alerts (email, SMS)
  • Host based Intrusion Detection System
  • CPU, Memory utilization reports
  • Log collection, analysis and reporting of servers, devices and applications
  • Daily management reports

Email Security

  • Security Audit and Hardening
  • Email Server Hardening
  • Application Audit
  • Patch Management
  • Anti-Spam solution
  • Content Filtering
  • Text based
  • Signature based

Intrusion Management and Analysis

  • Set-up of Appin Radar IMS for Server VLAN, Data Center and other critical IT assets
  • Real-time threat monitoring
  • Threat detection
  • Creation of policies for threat prevention
  • Periodic revision of policies
  • Regular management summary reports
  • Routine configuration and management
  • Uptime as per SLA

Anti-Virus Management

  • Set-up, configuration and maintenance of Anti-Virus server
  • Ensure latest anti-virus updates
  • Automatic scans and patching