Managed Security Services
I2SC delivers proactive protection, improved compliance, and business continuity through a unique service delivery model combining Information Assurance Consulting, efficient controls implementation (predictability management portfolio), and Managed Security Services. I2SC ‘s managed security portfolio delivers comprehensive protection and improved compliance through a collaborative framework offering a wide variety of choices across the Cost / Value / Features spectrum.
I2SC MSS Services
1. Total Protection Portfolio
Managed VirusScan with AntiSpyware service checks for viruses, spyware, unwanted programs, and other potential threats brought in to network on removable media or via email. Every time a file is accessed, the service scans the file to make sure it is free of viruses and spyware.
Managed Personal Firewall Service establishes a barrier between each computer and the internet or other computer on your local network. It silently monitors communications traffic for suspicious activity and takes appropriate action, such as blocking.
Browser Protection Service displays information to safeguard users against web-based threats. Users can view website safety reports as they browse through Microsoft Internet Explorer or Mozilla Firefox. This is included with the MVS offering.
‘Assure’ – Secure Messaging. This service protects against email threats by scanning messages before they are received. Secure mail service provides a complete and integrated mail security with fast performance. Secure mail service protects against multiple content security threats; including viruses, exploits, malicious code, spam, cookies, MS Office documents, hacker attacks.
‘Stream’ – Secure Surfing. This service is a real-time, non-proxy HTTP/FTP inspection with patented NitroInspection™ technology and provides Multi-layer spyware protection with infection prevention and a client-less Spyware Neutralizer™ which eliminates existing spyware threats. Secure Surfing also helps eliminate security vulnerability (security holes), zero-day exploits as well as transparently block all web page (HTML) ‘driven by’ attacks and exploits.
The Endpoint Security Service is the industry’s most comprehensive, secure and easy-to-use endpoint information leakage prevention solution – controlling every endpoint and every device, over every interface. Endpoint Security monitors real-time traffic and applies customized, highly-granular security policies over all physical, wireless and storage interfaces.
2. Log Management, Analysis & Compliance Services
The Log Management Service helps make sense of the mountains of logs generated by IT infrastructure including security devices and take crucial decisions on fault management, performance management, forensics and security. Our Service also extends beyond hardware infrastructure to the application layer and help achieve compliance. The service is available as an on-premise solution with consulting and professional services or as a hosted solution with raw logs being analysed and archived by I2SC . A core component of SecureTone service portfolio, I2SCenables clients to track and analyze user activity across infrastructures and platforms while eliminating the burden of maintaining, and monitoring logs in-house.
3. Security Device Management
I2SC can monitor and manage a broad range of security devices covering the network perimeter, internal network, extranet connections, as well as servers, desktops, and laptop security. These devices could include firewalls, Intrusion Prevention equipment, IDS’s, Remote access equipment as well as VPN’s. I2SC takes on responsibility for the lifecycle management of the security infrastructure and continuously manages the threats and risks including policy updates, signature updates etc. Our analysts ensure that the platform, operating system and the relevant software are managed remotely including installation of security patches, hot fixes and service packs. I2SCconsultants analyzes the rule sets and recommends an overall security posture which is used to define policies.
4. In Source Security Service
I2SC ‘s In Sourcing Service offers clients the flexibility of having their own security infrastructure managed with I2SC Expertise. This ensures faster time-to-market as the client SOC leverages I2SC ‘s proven, market-leading capabilities. Establishing in-house expertise and resources required for around-the-clock coverage is costly and time-prohibitive. Skill sets are also hard to come by. I2SChelps ensure that the client SOC is staffed adequately and best practices are in place – providing optimal information security protection for your organization.
5. Vulnerability Management Services
With Vulnerability Management Services, you can evaluate vulnerabilities for resources that are exposed to the Internet including wireless access points and load balancers, so that you have an accurate picture of your assets, vulnerabilities, and security status. You get to see what the hackers see-weak spots in your systems and applications exposed to the internet. Our service analyzes all types of vulnerabilities and flawed configurations on operating systems, network devices, commercial applications, databases, wireless devices, and custom web applications. To minimize the possibility of attacks, you can quickly detect and remediate vulnerabilities. You can also assess how new threats are affecting your risk profile. The risk ranking for each threat is correlated to asset and vulnerability information allowing you to prioritize your vulnerabilities and respond quickly to protect your assets.