|
|
Service Offering | Description | Deliverables |
---|---|---|
Assessment Services | Survey of existing security infrastructure and help preparing security policy | Information Security Policy |
Advisory Services | Up-to-date information about vulnerabilities on customer infrastructure | Latest vulnerability notification, Patch release notification, Virus warnings, Security solution recommendations |
Scanning services | Scanning of networks, systems, and databases to check for the effectiveness of security measures and to prepare an audit security baseline | Periodic scan reports |
Penetration Testing | Simulation of real intruder's attacks in a controlled and safe way to discover any vulnerabilities in the system | Periodic Penetration Test Reports |
Online Intrusion Detection | Protecting the network by analyzing the information from a variety of system and network sources for signs of intrusion and responding to containing these intrusions | Incident reports, Forensic Analysis Reports, Event Summary Reports, Intrusion Trend Report |
Security Services Implementation | Installation and configuration of firewall, intrusion detection system, content management, and virus wall services | Working security services |
Remote Firewall Management | Remote support and management of Firewalls, managing and maintaining firewall policies, firewall log analysis and auditing, firewall incident reporting | Remote policy, Management reports, and Log Analysis Report |
|
|