fbpx

Vigilance™ Managed Firewall, Powered by HaaS

Home » Services » Managed Security Services » Vigilance Managed Firewall, Powered by HaaS

We understand that your organization’s network security is important to you. But, retaining a Managed Security team can cost upwards of $200,000 per year. In response to the need for an affordable SMB monthly solution, we created Hardware as a Service (HaaS).

Our offering comes with state-of-the-art hardware, committed support and access to Intrinium’s proactive intelligence threat feed. We offer the option to deploy on-premise and major cloud providers. If you are an organization with up to sixty users, this solution is for you.

Monitoring

24 Hours a Day

7 Days a Week

365 Days a Year

This solution will provide the following:

State of the Art Fortinet Firewall

Remote Configuration and Logging

Comprehensive Reporting

FortiGuard AV

Application Control

Internet Services

Web Filtering

Malicious URL

URL Allow List

AV Database

Botnet Domain

Flow AV

IP Reputation

IPS

IP Geography Services

Benefits to your business

Cost savings of up to

per year

Let us protect your business at a price that fits your bottom line

  • State of the art technology and support
  • Expertise of Certified Security Professionals behind your business

  • Turnkey set up, allowing us to set it and you to forget it

  • Access to proactive threat feeds and full change management procedures

We are here to help, contact us today.

Gap Analysis 101

f you have spent any time around information technology or people who work in information security, you have probably heard terms like “risk assessment”, “audit”, and “gap analysis”. Sometimes they are used almost interchangeably. However, each has a specific objective to help stakeholders understand their data environment.

While an audit is used to identify control effectiveness and a risk assessment can identify what controls can be implemented to reduce risk, the gap analysis is designed to do exactly what it states – to identify gaps between the current environment and the organization’s required or desired state. This may be a specific regulatory compliance objective, such as how the organization meets the requirements of the HIPAA Security and Privacy Rules or PCI-DSS. In many cases, an organization may want to be able to claim that they are compliant with an information security standard, such as ISO27001. In other instances, the organization may have developed a roadmap for where they plan to be in the future, and want to identify the current progress and next steps. A gap analysis can provide essential feedback for all three examples.

BSides Portland 2019 Recap

At Intrinium, we strive to offer as many opportunities as possible to further education, encourage team collaboration, and networking across our industry. Last weekend, our Managed Security Services team headed to the Portland Convention Center for BSides Portland...

BSides Sacramento: The Recap

  This past weekend, Partner and Advisory CISO, Stephen Heath attended the inaugural BSides event in Sacramento, California. BSides is a national Information Security conference that takes place throughout the nation, it is 100% volunteer organized to continue to...

Cryptocurrency Security 101

By Turner Lehmbecker – Information Security Researcher – Intrinium Introduction With the increasing popularity and value in Bitcoin and other cryptocurrencies like it, many people have become interested in exploring the use of cryptocurrency as potential investments...

Pin It on Pinterest