Trust-IT’s Network Security Services provide proactive threat detection, superior analysis, and prioritized response to reduce network security risks to operations, data security and regulatory compliance. Trust-IT’s Network Security Services include real-time intrusion detection systems, private firewalls and VPN systems, compliance systems, endpoint security and data protection. For more information please contact us.
Site assessment and strategic network design guidance
IDS/IPS appliance installation, configuration and tuning
Creation of detection policies; update and tuning on an ongoing basis
Continuous device upgrades, patch management and device configuration maintenance
Network event monitoring
Real-time Network Intelligence
Real-time User Intelligence
Real-time Detection, Response, and Escalation of known security threats
Comprehensive reporting; on-demand and scheduled
Real-time reporting and alerting for all security events.
Device health and performance monitoring
Full backup and recovery of configurations and detection policies
Customer notification of major security, health, intrusion events
24x7x365 IDS/IPS device monitoring and management
24x7x365 log monitoring, analysis, correlation, and event notification
24x7x365 On-site Support in Case of Emergency
Site assessment and strategic network design guidance
Firewall policy design, device installation and configuration
Continuous Rule-Set validation, verification, tuning, and optimization
Continuous review of firewall policy and firewall security posture
Continuous firewall upgrades, patch management and device configuration maintenance
Continuous log monitoring, analysis and archival
Comprehensive reporting; on-demand and scheduled
Device health and performance monitoring
Full backup and recovery of firewall configuration
Firewall fault analysis and problem resolution
24x7x365 Firewall device monitoring and management
24x7x365 log monitoring, analysis, correlation, and event notification
24x7x365 On-site Support in Case of Emergency
Site assessment and strategic network design guidance
NAC policy design, platform installation and configuration
Define and enforce corporate network security posture through NAC Platform
Continuous monitoring of secure relationships between specific network resources, users, for specific time intervals
Continuous tracking of individual users or hosts independent of their IP addresses.
Continuous protection against various network intrusions and illicit access, whether from inside or out.
Provides a clear path to enhanced compliance and auditing requirements.
Handles security and access for remote and mobile workers.
Central Management through web-based console
Comprehensive reporting; on-demand and scheduled Full backup and recovery of configuration
24x7x365 NAC Platform monitoring and management
24x7x365 log monitoring, analysis, correlation, and event notification
24x7x365 On-site Support in Case of Emergency
Site assessment and strategic network VPN design guidance
VPN architecture design, equipment installation and configuration of any VPN solution
VPN Solutions include : SSL VPN Remote Access, IPSec VPN Remote Access, Site-to-Site VPN, DMVPN, GET VPN
Configuration and management of VPN Routers, Concentrators, VPN Appliances
Continuous log monitoring and log archival
Continuous VPN architecture tuning and optimization
VPN troubleshooting
VPN User provisioning, account creation/deletion, logging, and auditing
Integration with MS Active Directory and SSO, Tokens etc
Token life cycle management and token provisioning
Comprehensive reporting; on-demand and scheduled
Complete backup and recovery of configurations and security policies
24x7x365 VPN equipment monitoring and management
24x7x365 On-site Support in Case of Emergency
Site assessment and strategic network design guidance
Endpoint security policy design, platform installation and configuration
Customized security policy design and tuning
Immediate response to prevent hacker attacks directed at your protected servers/desktops
Real time, behavior-based attack blocking
Elimination of known and unknown attacks (zero day)
Immediate updates as new attacks are identified
In-depth logging and reporting on attempted intrusions
Superior protection against buffer overflow, port scans and SYN floods
Comprehensive reporting; on-demand and scheduled
Real-time reporting and alerting for all security events.
Customer notification of major security, health, intrusion events
Central security policy management
24x7x365 device monitoring and management
24x7x365 log monitoring, analysis, correlation, and event notification
24x7x365 On-site Support in Case of Emergency
Site assessment and strategic network design guidance
DLP policy design, platform installation and configuration
Define and enforce corporate network security posture through DLP Platform
Creation of DLP policies; update and tuning on an ongoing basis
Continuous monitoring of data in use (e.g endpoint actions) between specific network resources and users.
Continuous monitoring of data in motion (e.g network actions) between specific network resources and users
Continuous monitoring of data at rest (e.g data storage) between specific network resources and users.
Continuous device upgrades, patch management and device configuration maintenance
Central Management Framework
Real-time reporting and alerting for all security events.
Comprehensive reporting; on-demand and scheduled
Full backup and recovery of configuration
Customer notification of major security events
24x7x365 DLP Platform monitoring and management
24x7x365 log monitoring, analysis, correlation, and event notification
24x7x365 On-site Support in Case of Emergency
Wireless equipment installation and configuration
Use of the latest authentication and encryption schemes
Continuous visibility of who is connected through intelligent management
Real-time spectrum and protocol visibility
Wireless location tracking – to detect rouge or unauthorized access point in the network.
Centralized configuration management of Wireless Devices
Wireless IPS – to detect Wireless based intrusions.
Customer notification on unauthorized access
Comprehensive reporting; on-demand and scheduled
24x7x365 wireless equipment monitoring and management
24x7x365 monitoring, analysis, correlation, and event notification
24x7x365 On-site Support in Case of Emergency