Vigilance™ Managed Firewall, Powered by HaaS

We understand that your organization’s network security is important to you. But, retaining a Managed Security team can cost upwards of $200,000 per year. In response to the need for an affordable SMB monthly solution, we created Hardware as a Service (HaaS).

Our offering comes with state-of-the-art hardware, committed support and access to Intrinium’s proactive intelligence threat feed. We offer the option to deploy on-premise and major cloud providers. If you are an organization with up to sixty users, this solution is for you.

Monitoring

24 Hours a Day

7 Days a Week

365 Days a Year

This solution will provide the following:

State of the Art Fortinet Firewall

Remote Configuration and Logging

Comprehensive Reporting

FortiGuard AV

Application Control

Internet Services

Web Filtering

Malicious URL

URL Allow List

AV Database

Botnet Domain

Flow AV

IP Reputation

IPS

IP Geography Services

Benefits to your business

Cost savings of up to

per year

Let us protect your business at a price that fits your bottom line

  • State of the art technology and support
  • Expertise of Certified Security Professionals behind your business

  • Turnkey set up, allowing us to set it and you to forget it

  • Access to proactive threat feeds and full change management procedures

We are here to help, contact us today.

What is a Risk Assessment?

Chiara Morrison - Manager, Marketing  What is a Risk Assessment? Risk Assessment is the combined effort of executing the following: 1.     Identifying and analyzing potential (future) events that may negatively impact individuals, assets, and/or the environment (i.e.,...

External Penetration Test 101

Chiara Morrison - Manager, Marketing  All businesses, large and small, face the growing challenge of Information Security within the organization. As an SMB, we know you want to protect your clients’ data and meet compliance requirements without allocating a...

Side-Channel: Page Cache Attacks

A side-channel attack is an attack vector through which a threat could glean information from your computer or information system. This could be as simple as reading emissions (see Emissions Security or EMSEC) from your computer to using sophisticated methods of monitoring data being written onto your hard disk and making determinations that way.

California Consumer Policy Act of 2018

Chiara Morrison - Manager, Marketing  2018 has been the year of regulation in the Information Security community from General Data Protection Regulation (GDPR) to the California Consumer Policy Act (CCPA), privacy and security is more important than ever.  2019 is...

Top 18 of 2018

Chiara Morrison - Manager, Marketing  As we wrap up the year, we wanted to share some of our favorite and most trafficked blog posts from our staff writers. We hope you enjoy! https://intrinium.com/smb-relay-attack-tutorial/ https://intrinium.com/events-2/...

FortiGate: The Best Firewall Value

By Sahan Fernando –Director, Managed Security– Intrinium   To maximize the value of your IT spend, Intrinium recommends the simple and effective architectural design of the Fortinet FortiGate. The FortiGate is a next generation firewall (NGFW) that provides high...

Convention Life 2018

By Sahan Fernando –Director, Managed Security– Intrinium   Intrinium believes in employee engagement, enrichment and education. One of my favorite parts of my job is having the ability to attend conferences. It is one of the best ways to stay up to date on relevant...

Events to Look for in a Firewall

By Augusto Melo – Information Security Analyst– Intrinium Regardless of your company size,  Information Security is indispensable, and firewalls are one of the first lines of defense against cyber threats. Fortunately, there are many firewall offerings available in...

Pin It on Pinterest