05.11.2014 Views

eHosting DataFort Brochure

eHosting DataFort Brochure

eHosting DataFort Brochure

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6. Vulnerability Assessment<br />

• Identifies vulnerabilities that intruders may be<br />

able to exploit<br />

• Provides a security analysis of clients’<br />

network, security and architecture<br />

development<br />

• Assesses risk for safeguarding customer<br />

information and delivers responsive,<br />

proactive support<br />

• Offers three key assessments in: Network<br />

Assessment, Computer Assessment,<br />

Architecture Design and Review<br />

7. Web Application Audit<br />

• Secures applications to protect corporate<br />

information and assets<br />

• Offers an application audit and code review<br />

involving a comprehensive test on the<br />

corporate applications to check its security<br />

posture against various threats<br />

• Provides possible recommendations and best<br />

practices<br />

8. Security Monitoring Services<br />

• Has access to the Security Operations<br />

Center (SOC) for day-to-day management of<br />

firewalls, Intrusion Detection systems and<br />

other security assets on a 24x7 basis<br />

• Offers advanced enterprise-wide virus<br />

protection and monitoring from a single<br />

management console<br />

• Monitors security logs of Firewalls and<br />

Intrusion Detection Systems<br />

• Software upgrades performed on Firewalls<br />

and Intrusion Detection Systems as<br />

deemed necessary to maintain optimum<br />

performance on all platforms<br />

• Scan on an automated basis any recurring<br />

vulnerabilities<br />

• Incident based reporting<br />

9. Spam Protection<br />

• Offers heightened mail protection<br />

• Anti-spam gateway solutions ensure that<br />

customers receive as little spam mail in<br />

their mailbox as possible<br />

• With a wide range of different technologies<br />

and methods including Header checking,<br />

DNS / SPF checking (that identifies if<br />

incoming email is a spoof or not) to virus<br />

detection, we ensure that our customers<br />

mailing system is completely protected<br />

10. Security Correlation Engine<br />

• Logging infrastructure collects logs from<br />

various devices such as firewalls, servers<br />

OS and access control devices and<br />

applications; the logs match significant<br />

signatures criteria in one engine to add a<br />

proof of a consistent threat<br />

• Allows an enhanced alerting mechanism<br />

by matching logs from different devices on<br />

the same incident

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!