eHosting DataFort Brochure
eHosting DataFort Brochure
eHosting DataFort Brochure
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
6. Vulnerability Assessment<br />
• Identifies vulnerabilities that intruders may be<br />
able to exploit<br />
• Provides a security analysis of clients’<br />
network, security and architecture<br />
development<br />
• Assesses risk for safeguarding customer<br />
information and delivers responsive,<br />
proactive support<br />
• Offers three key assessments in: Network<br />
Assessment, Computer Assessment,<br />
Architecture Design and Review<br />
7. Web Application Audit<br />
• Secures applications to protect corporate<br />
information and assets<br />
• Offers an application audit and code review<br />
involving a comprehensive test on the<br />
corporate applications to check its security<br />
posture against various threats<br />
• Provides possible recommendations and best<br />
practices<br />
8. Security Monitoring Services<br />
• Has access to the Security Operations<br />
Center (SOC) for day-to-day management of<br />
firewalls, Intrusion Detection systems and<br />
other security assets on a 24x7 basis<br />
• Offers advanced enterprise-wide virus<br />
protection and monitoring from a single<br />
management console<br />
• Monitors security logs of Firewalls and<br />
Intrusion Detection Systems<br />
• Software upgrades performed on Firewalls<br />
and Intrusion Detection Systems as<br />
deemed necessary to maintain optimum<br />
performance on all platforms<br />
• Scan on an automated basis any recurring<br />
vulnerabilities<br />
• Incident based reporting<br />
9. Spam Protection<br />
• Offers heightened mail protection<br />
• Anti-spam gateway solutions ensure that<br />
customers receive as little spam mail in<br />
their mailbox as possible<br />
• With a wide range of different technologies<br />
and methods including Header checking,<br />
DNS / SPF checking (that identifies if<br />
incoming email is a spoof or not) to virus<br />
detection, we ensure that our customers<br />
mailing system is completely protected<br />
10. Security Correlation Engine<br />
• Logging infrastructure collects logs from<br />
various devices such as firewalls, servers<br />
OS and access control devices and<br />
applications; the logs match significant<br />
signatures criteria in one engine to add a<br />
proof of a consistent threat<br />
• Allows an enhanced alerting mechanism<br />
by matching logs from different devices on<br />
the same incident