© 2015 Prexient, All rights reserved.
1. Information Security Management
The main objectives of information security Manag...
of 1

Prexient IT Security Offerings

Published on: Mar 4, 2016
Source: www.slideshare.net

Transcripts - Prexient IT Security Offerings

  • 1. © 2015 Prexient, All rights reserved. 1. Information Security Management The main objectives of information security Management are to in collaboration with the Customer’s information security organization – go through the Customer’s current situation and identify the potential areas for improvement. The consultancy service advises, determines, and plans with the Customer how the information security improvements can be executed. 2. Managed Firewall/UTM and IDS/IDP/IDS Prexient Managed 24 X 7 UTM Service will provide security experts to handles updates, configurations, and patches, saving you time and money. Our advanced reporting provides real-time insight into network activity and our unparalleled compliance expertise reduces the costs and headaches associated with meeting regulatory compliance. As a result, Prexient solution empowers your team to focus on core business activities without security worry. Prexient UTM Service includes Firewall, IDS/IPS, and VPN Remote User Access. 3. Log Management services: Prexient log management service collects system event logs from active network devices, servers, operating systems, and applications and stores this log information centrally and in an archive for queries, reporting, or potential forensic investigation purposes. Finally, the compliance reporting service will provides the auditors with the required compliance reports. 4. Vulnerability Management Prexient’s Vulnerability Management provides baseline and discovery functions in support of vulnerability management. VM scan an endpoint and attempt to determine vulnerable conditions based on a database of known vulnerabilities. VM can also determine many other aspects of the endpoint, including open ports, running services and protocols, applications, and operating system. 5. 2FA Token Authentication Two factor Authentication Solutions allow you to easily enable Two- factor Authentication for access to protected Networks and Security devices. Two-factor authentication solutions improve security and reduce the risk of compromise inherent in single-factor authentication solutions such as static passwords.  Fully managed authentication servers hosted at Prexient Security Operations Center  Hard tokens, SMS, desktop & mobile soft tokens  Includes integration with customer applications  24x7 Service Desk – installation, PIN resets, replacement, application configuration issues, lockouts, change/add/delete modifications 6. Managed web Proxy Prexient’s cloud based Web Proxy Service provides Internet usage protection for users, enforces Internet usage policies, and protects user from virus issue, collocation issue, website cashing. 7. Risk Management Prexient has developed the processes and frameworks to enable enterprises to meet the Governance, Risk and Compliance requirements. Prexient GRC Solutions help enterprises to efficiently manage corporate & IT policies, provide superior reporting Capabilities on risk and compliance landscape, and thereby enable informed business decision making. Prexient Service includes ISO 27001, Sarbanes-Oxley Act (SOX), PCI DSS, BASEL II, and COBIT 5. 8. Penetration Testing Prexient offers Penetration Testing services that build upon each other and ultimately, help remediate your applications. We can customize a program based on your security needs. Penetration Testing is a great way to evaluate the security of an IT infrastructure safely without exploiting system vulnerabilities. Testing will assess service and application flaws, improper configurations, and risky end- user behavior. These tests are helpful when validating the efficacy of defense mechanisms and, also, evaluating end-user’s observance of security policy. 9. Incident Management and vCISCO services: The Prexient incident response executes rapid containment of threats which minimizes both the duration and impact of a security breach. We can help you to prepare for the respond to and recover from even the most complex and large-scale information security incidents like cyber-attack, DDOS etc. 10. Auditing and Compliance Prexient offers Audit & compliance readiness solution. The compliance readiness solution comes in the form of a Gap Analysis, Remediation plan, Implementation, Roadmap document and helping customers to achieve ISO 27001 / PCI certification from any vendors 11. Digital Forensics Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to crime. Digital forensics is used of scientific proven methods for the collection, validation, identification, analysis, interpretation, preservation, documentation and presentation of digital evidence. This evidence can be extracted from many digital sources such as CD/DVDs, hard drives, flash drives, memory sticks, and magnetic tapes, etc. Security Services Catalog

Related Documents