Contact Us:
    call us
408.243.1100
 

BC Networks, Inc. > Managed Services Program > Managed Security Services

Managed Security Services

Ever wonder: Can a hacker get to our internal network and systems data from the Internet?

Are you sure your systems are protected?  Is there any doubt that the latest patch was installed?  When was the last time it was tested?

The majority of today's hackers are extremely skilled... Many are intent on compromising your wired and/or wireless networks, to acquire your sensitive data or cause disruptions in your network infrastructure or online services.

Network management and network security go hand-in-hand.  Today, every network needs a high level of network security.  Networks continue to expand and the rapid convergence of voice, video and data into a single digital network is very close at hand.  Systems that were previously not vulnerable, are now highly vulnerable to attack due to the common communications protocols in use.  The proliferation of devices from handheld PDA's to wireless access points, commonly referred to as the "Entry Points" into a network are rapidly expanding and difficult to detect.

Government regulations such as Sarbanes Oxley & HIPPA and potential liabilities relating to lack of compliance continue to be the biggest factor driving demand in the information security market.

BC Networks can help you discretely manage the security issues facing your organization and identify possible network and system security problems by assisting your organization achieve and maintain compliance by providing a number of valuable add-on services to your company's in-house IT team by validating the integrity of the network and its components.

Each service offered by BC Networks is fully customized to meet the specific security and compliance needs of the client.

Security Implementation   Security Policies & Procedures  
  • Network Security Systems Installation

  • Firewalls, A/V, NIDS, IPS, Spyware, MAlware

  • Intrusion Prevention System

  • DMZ Creation

  • Network Modifications to Maximize Security

  • Security Policy GaaP Analysis

  • Policy Enforcement

  • Password Policies

  • Review of System Controls

  • Network Security Diagrams & Documentation

 

Due to the increasing complexities associated with securing data, along with the increasing number of risks that could contribute to a disruption of business activities a growing number of organizations are looking for Managed Security Services:

On-Demand Vulnerability Assessment   On-Going Vulnerability Management  

Developed specifically for clients interested in a 'one-time; snapshot view of their network's perimeter security.

A one-time scan provides a snap-shot view of your network's security at a single moment in time.

  • Internal and External scanning
  • Rogue, Wireless Access Point locating and testing
  • Firewall Policy review
  • DMZ's Effectiveness
  • Patch Compliance

Provides a report of the current state of security:

  • what ports were open and scanned
  • what tests were run and details of any detected vulnerabilities
  • Detection of improper system configuration

After remediation is performed, a follow-up scan, after corrections have been made, (to ensure vulnerabilities have been eliminated.)

 

Clients seeking on-going peace of mind typically prefer the On-going service, in which the network's security is tested periodically on a pre-determined schedule, and monitored for security events on a real-time basis.

Audits are performed on an ongoing, pre-scheduled basis

Differences from one audit to the next are noted in online real-time reports via our client portal:

  • 24x7 Real-time Endpoint Security Monitoring
  • Content Filtering & Reporting
  • Intrusion Detection Monitoring
  • Ensures that ongoing system changes are not adversely increasing risk to your security.
  • Provides the highest level of assurance that your system is secure.

Our methodologies are based upon and in accordance with best practices and standards set by SANS (SysAdmin, Audit, Network Security Institute), the FBI and NIST (The National Institute of Standards and Technology).  Check out some active advisories, are you watching these, because we are.