Security Device Management
Discover Our Expertise
We have qualified and trained engineers across a wide variety of security solutions from Cisco, Fortinet, Juniper, Bluecoat, Barracuda, F5, Checkpoint, Palo Alto to SonicWALL etc. to provide you a fully managed service for your change and incident management.
If you have any specific requirement, let us know. We would definitely be able to find a solution for you.

Our Security Device Monitoring Service Offering
-
Configuration/reconfiguration management, version upgrade/updates, security hardening, and patch management including firmware, OS, and software
-
Day to day administration of the security devices
-
System and configuration backup management
-
Signature updates of security devices e.g. firewall, IDS / IPS, proxy.
-
Changes to system alerts, monitoring, and logging functions
-
Rule base Management – Firewall, IDS/IPS and internet proxy.
-
Risk assessment of desired Changes
-
Regular rule-base addition, deletion, modification to allow/disable network access
-
Proactive recommendation to rule-base changes to mitigate vulnerabilities
-
Document & configuration of rule base
-
-
24x7 monitoring and detection of email phishing and malware attacks through
-
24x7 monitoring of anti-phishing and anti-malware tools
-
Proactive detection mechanism which monitors domain registrations, ISP’s email accounts,
-
Reverse Whois Database, global forums, industry phish reports etc.
-
-
Periodic review of policies and recommendations to ensure best possible security posture & efficiency
We currently support the following technologies and products:
-
Web Application Firewall – F5 ASM, Imperva
-
Firewall – Cisco, Fortinet, Checkpoint, Palo Alto, SonicWall
-
Internet Web Proxy – Barracuda
-
Denial Of Service – NetScout Arbor Networks
-
Email security – Office365 E3 (EOP/ATP), McAfee
-
Antivirus - McAfee, Symantec
Commercials
Our Security Device Monitoring Service pricing model is simple, flexible and based on few key criteria’s:
-
No of devices
-
Device category (e.g. firewall or proxy or antivirus)
-
Support timing (e.g. 24 x 7 or local timing)
-
Any specific design and implementation that's complex and requires dedicated subject matter expert(s)