Managed Security Services

SecurView’s Managed Services enable customers to focus on their businesses while we secure their networks and systems.

We provide managed services around major security and networking vendor devices

We combine people, processes, and technology to create a secure environment amid the complexity of modern business networks.

Our security analysts possess advanced industry certifications along with real-world security experience to assist organizations to quickly detect and effectively respond to security threats.

Our Methodology

Prevent

prevent
  • Network & host defense
  • Reporting & advisories
  • Malicious code & virus protection

Detect

detect
  • Intrusion Detection
  • Auditing

Assess

assess
  • Vulnerability, risk, & penetration
  • Data fusion, correlation, analysis, & storage

Manage

t
  • Management of key enablers/devices
  • Configuration management
  • Patch Management

Respond

manage
  • Computer incident response
  • Forensics & investigations

Supported Technologies

firewalls
cisco-2
PA
fortinet-2
checkpoint
jun-2
ids-ips
PA
firepower
mcaffeee
juniper
hp-tipping-point
hids
cisco
mcaffeee
checkpoint
symantec
web-servers
apache metreon
anti-virus
symantec
mcaffeee
Untitled-2
windows
unix
linux
databases
Oracle_Org
sql server
mysql
applications
blue coat
novell
active directory
routers
cisco
juniper
mcaffeee
endpoint-solutions
amp-for-endpoints
carbon-black
palo-alto

Service Highlights

SecHQ_Logo-w-black
sechq5
  • Serves as an “in-cloud” service-delivery platform for direct/indirect customers
  • Helps the SOC team “operate” the Managed Security Services from a central location supporting multiple “Points-of-presence”
  • Provides a single-pane-of-glass interface to the customer allowing them to interact with the SOC
  • Channel partners can view/update tickets if required for their customers

Cisco ASA Firepower

firepower 2

Our SOC Security Intelligence Platform and Cisco’s next-generation ASA firewalls integrate to provide unprecedented visibility and control into client-side applications, operating systems, virtual machines and mobile devices to meet a variety of use cases and strengthen end-to-end threat lifecycle management.

Cisco FirePOWER
Management Center Integration

Our SOC technology leverages Cisco’s eStreamer API to collect network security and flow data from the Cisco FireSIGHT Management Center (formerly Sourcefire), including information generated by Cisco’s next-generation firewall, Cisco ASA with FirePOWER services, and by Cisco’s next-generation Intrusion Prevention System (NGIPS), Cisco FirePOWER NGIPS.

firepower

Our SOC can ingest and optimise FireSIGHT data in real-time, and correlate threat activity and known vulnerabilities with other network data to deliver advanced security analytics, extended visibility, and provide continuous monitoring for real-time threat detection and response.

Our SOC can initiate an immediate protective action such as terminating communications with command-and-control servers or adding the malicious IPs to a Cisco firewall policy to prevent critical applications and servers from exposure.

Cisco AMP for Endpoints

a-fe-2
  • Real-Time Incident Response System
  • Baseline of the AMP for endpoint traffic for applications, documents, IP address, whitelist, and blacklist.
  • Collect the real-time events from the Firepower and AMP console through secured channel
  • Correlate events to enhance the monitoring standard and identify the possible incidents in the client’s network more accurately
  • SOC team responds to the customer via email, phone, etc. for event responses and escalations
  • Provide your IT Management team with specific policy level recommendations to address an immediate or impending threat
  • Weekly and Monthly Security Reporting
  • Quarterly Business Review

Security Monitoring Features

016-data-storage-5

Event Storage for Forensic Analysis

042-24-hours

24×7 Security Monitoring and Advanced Event Correlation of Customer Devices using SIEM tool

admin-ajax

ISO PCI-DSS 27001, SANS 20 Compliance Reports

shield-2

The configuration of the following:

Antivirus, Antispyware, File Blocking, Anti-Spam, Anti-Phishing, Content Filtering, URL Blocking, and URL Filtering

line-chart

Performance, Availability, and Threat Management

graph-4

Customizable SLA Response Time

019-calendar

Weekly, Monthly, and Quarterly reports

speed

Advanced Event Correlation and Real-Time Incident Response

009-idea

Access to Security Knowledge Base

log-file-format

In-Country Log Retention

1

Our Services are Scalable, Compliant, Cost-effective, and 24x7x365.

Want to Learn More?

Sign Up to receive a FREE White Paper on SecurView's MSS