Vigilance™ Managed Firewall, Powered by HaaS
We understand that your organization’s network security is important to you. But, retaining a Managed Security team can cost upwards of $200,000 per year. In response to the need for an affordable SMB monthly solution, we created Hardware as a Service (
Our offering comes with state-of-the-art hardware, committed support and access to
proactive intelligence threat feed. If you are an organization with up to sixty users, this solution is for you. Intrinium’s
24 Hours a Day
7 Days a Week
365 Days a Year
This solution will provide the following:
State of the Art Fortinet Firewall
Remote Configuration and Logging
URL Allow List
IP Geography Services
Benefits to your business
Cost savings of up to
Let us protect your business at a price that fits your bottom line
- State of the art technology and support
Expertise of Certified Security Professionals behind your business
Turnkey set up, allowing us to set it and you to forget it
Access to proactive threat feeds and full change management procedures
By Stephen Heath - Partner and Advisory CISO - Intrinium A relatively sophisticated spear phishing attack has been reported by InfoSec journalist Brian Krebs of Krebs on Security that appears to target many US financial institutions, including Banks and Credit...
The Health Information Technology for Economic and Clinical Health (HITECH) Act changed the HIPAA requirements for notifications after a breach.
Chiara Morrison - Manager, Marketing Spokane Mayor's Cyber Cup 2019 Chiara Morrison sat down to interview the creator of Spokane Mayor’s Cyber Cup 2019, Max Dulin, Senior at Gonzaga University, Computer Science Major. Chiara: Max, can you tell me a little bit about...
Chiara Morrison - Manager, Marketing What is an Internal Vulnerability Test? The Intrinium Internal Vulnerability Assessment evaluates IT security from the inside of your organization and identifies critical vulnerabilities that could be exploited by attackers that...
Chiara Morrison - Manager, Marketing What is a Risk Assessment? Risk Assessment is the combined effort of executing the following: 1. Identifying and analyzing potential (future) events that may negatively impact individuals, assets, and/or the environment (i.e.,...
Chiara Morrison - Manager, Marketing All businesses, large and small, face the growing challenge of Information Security within the organization. As an SMB, we know you want to protect your clients’ data and meet compliance requirements without allocating a...
A side-channel attack is an attack vector through which a threat could glean information from your computer or information system. This could be as simple as reading emissions (see Emissions Security or EMSEC) from your computer to using sophisticated methods of monitoring data being written onto your hard disk and making determinations that way.
By Shea McHugh -Information Security Analyst- Intrinium Streamlining Technology Security for SMB External penetration testing is a great first step in assessing your network. After your network assessment is completed, we recommend reviewing your approach...
Chiara Morrison - Manager, Marketing 2018 has been the year of regulation in the Information Security community from General Data Protection Regulation (GDPR) to the California Consumer Policy Act (CCPA), privacy and security is more important than ever. 2019 is...
Chiara Morrison - Manager, Marketing As we wrap up the year, we wanted to share some of our favorite and most trafficked blog posts from our staff writers. We hope you enjoy! https://intrinium.com/smb-relay-attack-tutorial/ https://intrinium.com/events-2/...