We provide our customers with a range of customized security services that offer a complete security solution and meet the specific needs of any organisation. Our gamut of security services offered to customers are client, gateway and server security solutions for virus, spam and spyware, firewall and virtual private network, vulnerability management, intrusion detection and prevention, Internet content and e-mail filtering, Traffic shaping, load balancing, remote management technologies.
Secure Solutions is well equipped to respond to the growing needs of our customers and partners. Relying on a proven methodology, we can help you fully leverage security services and technology solutions and maximize your investment. Contingency plans and documented processes are in place to assure seamless and continual monitoring. Secure Solutions also collaborates with key partners and alliance organisations to deliver our services, enabling customization to meet your business requirements.
We ensure that the products are correctly configured, easily scalable, and fully compliant. Our team of systems and network security specialists implements the best practices vital to any successful security rollout, regardless of size, enabling you to lock in long-term advantages for both your IT environment and your business. Our Support team of industry-leading experts prepares you for emerging online threats and makes your defenses more robust. What sets us apart from other service providers is our ability to understand client requirements, the value of network security services and customize solutions to meet their needs with a unique approach.
Secure Solutions ensure consistent service delivery, customer communication, and overall value.We will provide all the trained manpower required, thereby avoiding recurring operational expense, training or management costs associated with network security. As a result, your costs are defined and predictable.
End point security
Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. The features includes in an End Point Security are : Real-time anti-virus and anti-spyware, Desktop Firewall, Intrusion Detection/Prevention Protection for Mac OS X, Protection for Linux, Device and Application Control, Network Access Control Self-Enforcement ready, Centrally Management, Application control, Endpoint encryption, Multi-platform and mobile device support, Desktop policy auditing, Web filtering – Host
SSL Certificates: SSL Certificates are small data files that digitally bind a cryptographic key to an organisation's details. When installed on a web server, it activates the padlock and the https protocol (over port 443) and allows secure connections from a web server to a browse
Geo Trust: GeoTrust is the world's second largest digital certificate provider. More than 100,000 customers in over 150 countries trust GeoTrust to secure online transactions and conduct business over the Internet.
UTM and FIREWALL
UTM is the evolution of the traditional firewall into an all-inclusive security product able to perform multiple security functions within one single appliance.Features arefirewall, Intrusion Prevention System, Gateway Antivirus, Gateway Spyware, Gateway Spamware, Content Filtering, Load Balancing, VPN.In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic based on applied rule
Two factor authentication
UTM is the evolution of the traditional firewall into an all-inclusive security product able to perform multiple security functions within one single appliance.Features areFirewall, Intrusion Prevention System, Gateway Antivirus, Gateway Spyware, Gateway Spamware, Content Filtering, Load Balancing, VPN
WEB APPLICATION FIREWALL
A web application firewall is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. By customizing the rules to your application, many attacks can be identified and blocked.
An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with a standard Web browser
Intrusion Prevention system
Intrusion prevention systems (IPS) are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it.
Protection of confidential information is of the highest priority in UW Medicine. Confidential information includes protected health information (PHI) and personally identifiable information (PII). If possible, users should avoid storing PHI or PII on laptops, USB memory sticks, and other mobile devices since any information on a mobile device is at elevated risk for unauthorized disclosure secondary to loss and theft. If storage of PHI or PII on a mobile device is necessary, UW Medicine requires that these devices be encrypted.
SIEM (Reporting an event correlator)
Security information and event management is a term for software and products services combiningsecurity information management (SIM) and security event management (SEM). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications.
VULNERABILITY ASSESSMENT TOOL
Vulnerability assessment tools discover which vulnerabilities are present.Vulnerability scanners alert companies to the pre-existing flaws in their code and where they are located.This approach gives an organization a more detailed view of the threats facing its applications, enabling the business to better protect its systems and data from malicious attacks
BACKUP AND RECOVERY
BACKUP AND RECOVERY refers to the various strategies and procedures involved in protecting your database against data loss and reconstructing the database after any kind of data loss
Advantage of clustering servers for high availability is seen if one node fails, another node in the cluster can assume the workload of the failed node, and users see no interruption of access.
DISASTER RECOVERY & REPLICATION
The policies, process and procedures that are related to preparing for recovery or continuation of technology infrastructure which are vital to an organization after a natural or human-induced disaster. Replication is the concept of copying data as it is changing over to another site. So as you change a file that changes a few blocks, then the idea is that those blocks get sent incrementally over to another system that then overwrites the same blocks on the target system. So, you continually have an updated copy of what you have on one site, living on another site
EMAIL ARCHIVAL RECORD RETENTION
Email Archiving is the act of preserving and making searchable all email to/from an individual.And Retention defines the policies of persistent data and records management for meeting legal and business data archival requirements.
HIGH AVAILABILITY SOLUTIONS
High availability system design approach and associated service implementation that ensures a prearranged level of operational performance will be met during a contractual measurement period
A data centre is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls and various security devices
Network infrastructure refers to the hardware and software resources of an entire network that enable network connectivity, communication, operations and management of an enterprise network.Network infrastructure provides the communication path and services between users, processes, applications, services and external networks/the Internet
The process of organizing and maintaining a website's reciprocal links
WEB ACCELERATION VPN (SSL & IPSEC)
Prevent your sensitive data from being stolen and make your applications faster
Traffic shaping is used to optimize or guarantee performance, improve latency, and/or increase usable bandwidth for some kinds of packets by delaying other kinds.It is also known as "packet shaping" is a computer network traffic management technique which delays some or all datagrams to bring them into compliance with a desired traffic profile.
Load balancing is especially important for networks where it's difficult to predict the number of requests that will be issued to a server. Busy Web sites typically employ two or more Web servers in a load balancing scheme. If one server starts to get swamped, requests are forwarded to another server with more capacity. Load balancing can also refer to the communications channels themselves.