BC Networks, Inc. >
Managed Services Program >
Managed Security Services
Managed Security Services
Ever wonder: Can a
hacker get to our internal network and systems data from the
Internet?
Are you sure your systems are
protected? Is there any doubt that the
latest patch was installed? When
was the last time it was tested?
The majority of today's hackers are extremely skilled...
Many are
intent on compromising your wired and/or wireless networks, to
acquire your sensitive data or cause disruptions in your network
infrastructure or online services.
Network management and network security go hand-in-hand.
Today, every network needs a high level of network security.
Networks continue to expand and the rapid convergence of voice,
video and data into a single digital network is very close at
hand. Systems that were
previously not vulnerable, are now highly vulnerable to attack due to
the common communications protocols in use. The
proliferation of devices from handheld
PDA's to wireless access points, commonly referred to as the "Entry Points" into a
network are rapidly expanding and difficult to detect.
Government regulations such as
Sarbanes Oxley & HIPPA and potential liabilities relating to
lack of compliance continue to be the biggest factor driving demand
in the information security market.
BC Networks can help you discretely manage the security issues
facing your organization and identify possible network and
system security problems by assisting your organization achieve
and maintain compliance by providing a number of valuable add-on
services to your company's in-house IT team by validating the
integrity of the network and its components.
Each service offered by BC Networks is fully
customized to meet the specific security and compliance needs of
the client.
Security Implementation |
|
Security Policies & Procedures |
|
-
Network Security
Systems Installation
-
Firewalls,
A/V, NIDS, IPS, Spyware, MAlware
-
Intrusion
Prevention System
-
DMZ Creation
-
Network
Modifications to Maximize Security
|
|
-
Security
Policy GaaP Analysis
-
Policy
Enforcement
-
Password Policies
-
Review of
System Controls
-
Network Security Diagrams &
Documentation
|
|
Due to the increasing complexities associated with securing data, along with the increasing number of risks that could contribute to a disruption of business activities a growing number of organizations are looking for Managed Security Services:
On-Demand Vulnerability
Assessment |
|
On-Going Vulnerability
Management |
|
Developed specifically for clients interested in a 'one-time;
snapshot view of their network's perimeter security.
A one-time scan provides a snap-shot view of your network's security at a single moment in time.
- Internal and External
scanning
- Rogue, Wireless Access
Point locating and testing
- Firewall Policy review
- DMZ's Effectiveness
- Patch Compliance
Provides a report of the current state of security:
- what ports were open and scanned
- what tests were run and details
of any detected vulnerabilities
- Detection of improper system
configuration
After remediation is
performed, a follow-up
scan, after corrections
have been made, (to ensure
vulnerabilities have been
eliminated.)
|
|
Clients seeking on-going peace of mind typically prefer the
On-going service, in which the network's security is tested
periodically on a pre-determined schedule, and monitored for
security events on a real-time basis.
Audits are performed on an ongoing, pre-scheduled basis
Differences from one audit to
the next are noted in online
real-time reports via our client
portal:
- 24x7 Real-time Endpoint
Security Monitoring
- Content Filtering &
Reporting
- Intrusion Detection
Monitoring
- Ensures that ongoing system changes are not adversely increasing risk to your security.
- Provides the highest level of assurance that your system is secure.
|
|
Our methodologies are based upon and in accordance with best practices and standards set by
SANS (SysAdmin, Audit, Network Security Institute), the FBI and
NIST (The National Institute of Standards and Technology).
Check out some active
advisories,
are you watching these, because we are.
|