Vigilance™ Managed Firewall

Intrinium Vigilance™ Firewall is a comprehensive solution that has the flexibility to grow with your organization and budget. We provide firewall protection between your network and the internet, protecting your business against hacking, viruses, fraud, and internal threats.

The Vigilance™ Firewall Management Service will provide:

24x7x365 Protection of Network Data

Your firewall infrastructure is monitored 24x7x365 to allow immediate response to threats before damage is done.

Performance Enhancements

Extend your security posture to the edge of your network. Exclusive end to end firewall management catered to your environment.

Uptime & Availability

Reduce the risk of network and service interruptions with timely patching, support systems, and policies to maintain optimally configured firewall appliances.

Supporting Compliance Requirements

Maintain compliance gaps requiring perimeter security, access control, and log analysis to satisfy compliance requirements of PCI, HIPAA, ISO and (other standards) to demonstrate compliance and control to auditors and leadership of all levels.

Management & Monitoring

Simplify and streamline the management and monitoring of your firewall appliances, removing the burden of administering, maintaining, and monitoring your firewall.

Vigilance™ Endpoint Monitoring Service

Endpoint security is the last line of defense. It is the software or agent directly attached to the User’s every move. Simply having anti-virus and anti-malware is not going to save your network. However, by utilizing the centralized component of your organization’s Endpoint Security, we will monitor the events and health of your Endpoints. Advanced threats will evade information security controls. This service improves awareness with our 24x7x365 team at the helm to detect signs of endpoint compromise in real-time.

Monitoring & Alerting

  • We see a threat activity in real time.
  • We save you money by pinpoint the affected systems
  • quickly allowing for immediate incident response.

Mitigation

  • Immediate notification to your key
  • Decision makers when if/or when an incident occurs.
  • High alert response time under 4 hours.

Vigilance™ Intrusion Detection & Prevention Service

Management of the Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) devices is complex. We allow you to optimize productivity by allowing us to keep yours tuned to the current threats and the network within your unique network.

Monitoring & Alerting

  • Receive remediation assistance and security consultation.

Mitigation

  • customizable support for even the most complex environments.

Unlike other vendors, we support co-management, our client’s retain ownership and administrative rights to your IDS/IPS appliances to the extent that is desired. With this approach, our team can alleviate the management, maintenance, and monitoring efforts without your team being locked out.

We are here to help, contact us today.

What is a Risk Assessment?

Chiara Morrison - Manager, Marketing  What is a Risk Assessment? Risk Assessment is the combined effort of executing the following: 1.     Identifying and analyzing potential (future) events that may negatively impact individuals, assets, and/or the environment (i.e.,...

External Penetration Test 101

Chiara Morrison - Manager, Marketing  All businesses, large and small, face the growing challenge of Information Security within the organization. As an SMB, we know you want to protect your clients’ data and meet compliance requirements without allocating a...

Side-Channel: Page Cache Attacks

A side-channel attack is an attack vector through which a threat could glean information from your computer or information system. This could be as simple as reading emissions (see Emissions Security or EMSEC) from your computer to using sophisticated methods of monitoring data being written onto your hard disk and making determinations that way.

California Consumer Policy Act of 2018

Chiara Morrison - Manager, Marketing  2018 has been the year of regulation in the Information Security community from General Data Protection Regulation (GDPR) to the California Consumer Policy Act (CCPA), privacy and security is more important than ever.  2019 is...

Top 18 of 2018

Chiara Morrison - Manager, Marketing  As we wrap up the year, we wanted to share some of our favorite and most trafficked blog posts from our staff writers. We hope you enjoy! https://intrinium.com/smb-relay-attack-tutorial/ https://intrinium.com/events-2/...

FortiGate: The Best Firewall Value

By Sahan Fernando –Director, Managed Security– Intrinium   To maximize the value of your IT spend, Intrinium recommends the simple and effective architectural design of the Fortinet FortiGate. The FortiGate is a next generation firewall (NGFW) that provides high...

Convention Life 2018

By Sahan Fernando –Director, Managed Security– Intrinium   Intrinium believes in employee engagement, enrichment and education. One of my favorite parts of my job is having the ability to attend conferences. It is one of the best ways to stay up to date on relevant...

Events to Look for in a Firewall

By Augusto Melo – Information Security Analyst– Intrinium Regardless of your company size,  Information Security is indispensable, and firewalls are one of the first lines of defense against cyber threats. Fortunately, there are many firewall offerings available in...

Pin It on Pinterest