Solutions
We provide our customers with a range of customized security services that offer a complete security solution and meet the specific needs of any organisation. Our gamut of security services offered to customers are client, gateway and server security solutions for virus, spam and spyware, firewall and virtual private network, vulnerability management, intrusion detection and prevention, Internet content and e-mail filtering, Traffic shaping, load balancing, remote management technologies.
Secure Solutions is well equipped to respond to the growing needs of our customers and partners. Relying on a proven methodology, we can help you fully leverage security services and technology solutions and maximize your investment. Contingency plans and documented processes are in place to assure seamless and continual monitoring. Secure Solutions also collaborates with key partners and alliance organisations to deliver our services, enabling customization to meet your business requirements.
We ensure that the products are correctly configured, easily scalable, and fully compliant. Our team of systems and network security specialists implements the best practices vital to any successful security rollout, regardless of size, enabling you to lock in long-term advantages for both your IT environment and your business. Our Support team of industry-leading experts prepares you for emerging online threats and makes your defenses more robust. What sets us apart from other service providers is our ability to understand client requirements, the value of network security services and customize solutions to meet their needs with a unique approach.
Services
Secure Solutions ensure consistent service delivery, customer communication, and overall value.We will provide all the trained manpower required, thereby avoiding recurring operational expense, training or management costs associated with network security. As a result, your costs are defined and predictable.
Offerings
INFORMATION SECURITYEnd point securityEndpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. The features includes in an End Point Security are : Real-time anti-virus and anti-spyware, Desktop Firewall, Intrusion Detection/Prevention Protection for Mac OS X, Protection for Linux, Device and Application Control, Network Access Control Self-Enforcement ready, Centrally Management, Application control, Endpoint encryption, Multi-platform and mobile device support, Desktop policy auditing, Web filtering – Host ProductsCertified managementSSL Certificates: SSL Certificates are small data files that digitally bind a cryptographic key to an organisation's details. When installed on a web server, it activates the padlock and the https protocol (over port 443) and allows secure connections from a web server to a browse Geo Trust: GeoTrust is the world's second largest digital certificate provider. More than 100,000 customers in over 150 countries trust GeoTrust to secure online transactions and conduct business over the Internet. UTM and FIREWALLUTM is the evolution of the traditional firewall into an all-inclusive security product able to perform multiple security functions within one single appliance.Features arefirewall, Intrusion Prevention System, Gateway Antivirus, Gateway Spyware, Gateway Spamware, Content Filtering, Load Balancing, VPN.In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic based on applied rule ProductsTwo factor authenticationUTM is the evolution of the traditional firewall into an all-inclusive security product able to perform multiple security functions within one single appliance.Features areFirewall, Intrusion Prevention System, Gateway Antivirus, Gateway Spyware, Gateway Spamware, Content Filtering, Load Balancing, VPN ProductsWEB APPLICATION FIREWALLA web application firewall is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. By customizing the rules to your application, many attacks can be identified and blocked. ProductsSSL VPNAn SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with a standard Web browser ProductsIntrusion Prevention systemIntrusion prevention systems (IPS) are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it. ProductsMAIL SECURITYProtection of confidential information is of the highest priority in UW Medicine. Confidential information includes protected health information (PHI) and personally identifiable information (PII). If possible, users should avoid storing PHI or PII on laptops, USB memory sticks, and other mobile devices since any information on a mobile device is at elevated risk for unauthorized disclosure secondary to loss and theft. If storage of PHI or PII on a mobile device is necessary, UW Medicine requires that these devices be encrypted. ProductsSIEM (Reporting an event correlator)Security information and event management is a term for software and products services combiningsecurity information management (SIM) and security event management (SEM). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. ProductsVULNERABILITY ASSESSMENT TOOLVulnerability assessment tools discover which vulnerabilities are present.Vulnerability scanners alert companies to the pre-existing flaws in their code and where they are located.This approach gives an organization a more detailed view of the threats facing its applications, enabling the business to better protect its systems and data from malicious attacks ProductsINFORMATION MANAGEMENTBACKUP AND RECOVERYBACKUP AND RECOVERY refers to the various strategies and procedures involved in protecting your database against data loss and reconstructing the database after any kind of data loss ProductsCLUSTERINGAdvantage of clustering servers for high availability is seen if one node fails, another node in the cluster can assume the workload of the failed node, and users see no interruption of access. DISASTER RECOVERY & REPLICATIONThe policies, process and procedures that are related to preparing for recovery or continuation of technology infrastructure which are vital to an organization after a natural or human-induced disaster. Replication is the concept of copying data as it is changing over to another site. So as you change a file that changes a few blocks, then the idea is that those blocks get sent incrementally over to another system that then overwrites the same blocks on the target system. So, you continually have an updated copy of what you have on one site, living on another site ProductsEMAIL ARCHIVAL RECORD RETENTIONEmail Archiving is the act of preserving and making searchable all email to/from an individual.And Retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. ProductsHIGH AVAILABILITY SOLUTIONSHigh availability system design approach and associated service implementation that ensures a prearranged level of operational performance will be met during a contractual measurement period ProductsNETWORKINGDATA CENTREA data centre is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls and various security devices ProductsNETWORK INFRASTRUCTURENetwork infrastructure refers to the hardware and software resources of an entire network that enable network connectivity, communication, operations and management of an enterprise network.Network infrastructure provides the communication path and services between users, processes, applications, services and external networks/the Internet CONNECTIVITYLINK MANAGEMENTThe process of organizing and maintaining a website's reciprocal links ProductsWEB ACCELERATION VPN (SSL & IPSEC)Prevent your sensitive data from being stolen and make your applications faster TRAFFIC MANAGEMENTTraffic shaping is used to optimize or guarantee performance, improve latency, and/or increase usable bandwidth for some kinds of packets by delaying other kinds.It is also known as "packet shaping" is a computer network traffic management technique which delays some or all datagrams to bring them into compliance with a desired traffic profile. LOAD BALANCINGLoad balancing is especially important for networks where it's difficult to predict the number of requests that will be issued to a server. Busy Web sites typically employ two or more Web servers in a load balancing scheme. If one server starts to get swamped, requests are forwarded to another server with more capacity. Load balancing can also refer to the communications channels themselves. |