Vigilance Managed Firewall

Intrinium Vigilance Firewall is a comprehensive solution that has the flexibility to grow with your organization and budget. We provide firewall protection between your network and the internet, protecting your business against hacking, viruses, fraud, and internal threats.

The Vigilance Firewall Management Service will provide:

Protection of Network Data | Intrinium.com

24x7x365 Protection of Network Data

Your firewall infrastructure is monitored 24x7x365 to allow immediate response to threats before damage is done.

Performance Enhancements | Intrinium.com

Performance Enhancements

Extend your security posture to the edge of your network. Exclusive end to end firewall management catered to your environment.

Uptime & Availability | Intrinium.com

Uptime & Availability

Reduce the risk of network and service interruptions with timely patching, support systems, and policies to maintain optimally configured firewall appliances.

Supporting Compliance Requirements | Intrinium.com

Supporting Compliance Requirements

Maintain compliance gaps requiring perimeter security, access control, and log analysis to satisfy compliance requirements of PCI, HIPAA, ISO and (other standards) to demonstrate compliance and control to auditors and leadership of all levels.

Management & Monitoring | Intrinium.com

Management & Monitoring

Simplify and streamline the management and monitoring of your firewall appliances, removing the burden of administering, maintaining, and monitoring your firewall.

Vigilance Endpoint Monitoring Service

Endpoint security is the last line of defense. It is the software or agent directly attached to the User’s every move. Simply having anti-virus and anti-malware is not going to save your network. However, by utilizing the centralized component of your organization’s Endpoint Security, we will monitor the events and health of your Endpoints. Advanced threats will evade information security controls. This service improves awareness with our 24x7x365 team at the helm to detect signs of endpoint compromise in real-time.

Monitoring & Alerting | Intrinium.com

Monitoring & Alerting

  • We see a threat activity in real time.
  • We save you money by pinpoint the affected systems
  • quickly allowing for immediate incident response.
Mitigation | Intrinium.com

Mitigation

  • Immediate notification to your key
  • Decision makers when if/or when an incident occurs.
  • High alert response time under 4 hours.

Vigilance Intrusion Detection & Prevention Service

Management of the Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) devices is complex. We allow you to optimize productivity by allowing us to keep yours tuned to the current threats and the network within your unique network.

Monitoring & Alerting | Intrinium.com

Monitoring & Alerting

  • Receive remediation assistance and security consultation.
Mitigation | Intrinium.com

Mitigation

  • customizable support for even the most complex environments.

Unlike other vendors, we support co-management, our client’s retain ownership and administrative rights to your IDS/IPS appliances to the extent that is desired. With this approach, our team can alleviate the management, maintenance, and monitoring efforts without your team being locked out.

We are here to help, contact us today.

mitm6 Pen Testing

mitm6 Pen Testing

Summary: IPv6, we have all seen it, have been forced through subnetting it (Network Engineers, I’m looking at you), but many organizations seem to just not utilize it. While frequently staring into the monotonous output that ipconfig provides, IPv6 sits in the cold...

Understanding Incident Response, Planning and Cyber Insurance

Understanding Incident Response, Planning and Cyber Insurance

In less than one year, we’ve seen whole cities taken out by ransomware with no business continuity or disaster recovery plan in place to bring themselves back up- but it’s not just cities that don’t have a plan for when a catastrophe (digital or physical) hits.
Having a plan to restore business operations will save time, money, and stress, but that’s half the equation.  The other half is to practice the plan, make sure all the moving pieces fit together and make sure everything is practical and timely. Enough businesses have spent six digits or more due to not having an incident response plan- set your business and your industry apart.

Incident Response Plans: More Planning, Less Panic

Incident Response Plans: More Planning, Less Panic

In less than one year, we’ve seen whole cities taken out by ransomware with no business continuity or disaster recovery plan in place to bring themselves back up- but it’s not just cities that don’t have a plan for when a catastrophe (digital or physical) hits.
Having a plan to restore business operations will save time, money, and stress, but that’s half the equation.  The other half is to practice the plan, make sure all the moving pieces fit together and make sure everything is practical and timely. Enough businesses have spent six digits or more due to not having an incident response plan- set your business and your industry apart.

Gap Analysis 101

Gap Analysis 101

f you have spent any time around information technology or people who work in information security, you have probably heard terms like “risk assessment”, “audit”, and “gap analysis”. Sometimes they are used almost interchangeably. However, each has a specific objective to help stakeholders understand their data environment.

While an audit is used to identify control effectiveness and a risk assessment can identify what controls can be implemented to reduce risk, the gap analysis is designed to do exactly what it states – to identify gaps between the current environment and the organization’s required or desired state. This may be a specific regulatory compliance objective, such as how the organization meets the requirements of the HIPAA Security and Privacy Rules or PCI-DSS. In many cases, an organization may want to be able to claim that they are compliant with an information security standard, such as ISO27001. In other instances, the organization may have developed a roadmap for where they plan to be in the future, and want to identify the current progress and next steps. A gap analysis can provide essential feedback for all three examples.

Pin It on Pinterest