HOME
ABOUT
   AWARDS
   PROFILES
SOLUTIONS
   COMMERCIAL
  
GOVERNMENT
PARTNERS
CAREERS
NEWS
  
 

IT SUPPORT | NETWORKS | DATABASES | HOSTING | SECURITY

 
 

 

 

SECURITY

UTS provides proactive management of network perimeter security. Comprehensive and affordable managed security solutions enables businesses to focus their resources on core operations while maintaining peace of mind that their information assets are being watched over.

  Managed service minimizes cost and maximizes quality of service
  24 x 7 monitoring ensures around the clock protection
  Daily reporting communicates the latest information on security initiatives
 
Managed Security Services

  Managed Firewall
  Managed Intrusion Detection
  Managed VPN
  Managed Anti-Virus
  Spam Filtering
●  Content Filtering
Professional Security Services

  Security Awareness Training
  Business Continuance Planning
  Penetration Testing
  Security Policy Development and Review
 

 

Managed Firewall

Firewall management is available in a variety of configurations to secure your always on broadband connection. Firewalls are configured, installed, monitored and replaced upon failure. This complete service provides for 24x7 monitoring and logging, unlimited policy changes, firewall updates, firewall activity reporting and regularly scheduled vulnerability assessments.  
BACK TO TOP

Managed Intrusion Detection

Network-based intrusion detection sensors are strategically installed and configured to detect suspicious activity. Notifications of high priority incidents are sent immediately to the appropriate incident response personnel. Recommended response scenarios are provided with each event notification. UTS provides 24 x 7 IDS monitoring.
Further reading on IDS
BACK TO TOP

Managed VPN

VPN management extends communication and connections to home users, remote workers, partners and/or mobile users while ensuring the data being exchanged is safeguarded. This VPN solution covers all of the important features. IPSec compatibility gives you interoperability with existing equipment. Des or 3DES Encryption and SHA-1 or MD5 Authentication makes sure your data is safe in transit.
BACK TO TOP

Managed Antivirus

Anti-virus scanners are the front line technology for preventing virus attacks. Because anti-virus software is primarily a reactive measure against known threats, updating, detection and policy enforcement play a key role in meeting the latest threats and protecting networks from infection. Updating your anti-virus software in the fastest time possible is the only way to minimize damage to your network. Today's virus protection is all about time-to-protection, and by integrating this security feature with the firewall additional safety can be provided with auto-enforcement and rapid a-mail attachment blocking.
BACK TO TOP

Spam Filtering

Unlike most spam filtering solutions, which use one or two spam-classification techniques, UTS employs MX Logic’s Stacked Classification FrameworkSM, which aggregates the most effective spam filters and techniques in the industry, currently leveraging the strengths of five top spam-fighting filters.

No contract minimums required and can be provided on a month to month basis, thus providing the opportunity to implement a solution without a large initial investment for software; hardware and administrative time to implement.
BACK TO TOP

Content Filtering

Web content filtering enforces your Internet usage policy. Integrated with the firewall management, this service will provide confidence that employees are using the Internet for the benefit of the business and reduce corporate liability.
BACK TO TOP

Security Awareness Training

Education and training are essential components to any good security program. People are the most critical element for the overall security of an organization. People are responsible for implementing security controls. People are responsible for following security policy. People make critical decisions for your organization every day. Not only must they understand what to do, they should also have a firm understanding of why. Understanding has been shown to be the largest factor contributing to employee compliance with security policy.
BACK TO TOP

Business Continuance Planning

Business Continuance Planning (BCP) is an important piece of any company's successful recovery after a malicious act has occurred. To ensure a full recovery to a state of being able to continue business as usual, the BCP should include a Disaster Recovery Plan (DRP) as well. Here we have shown a few things to consider when developing your BCP and DRP.
BACK TO TOP

Penetration Testing

At UTS we consider penetration testing to be the capstone of any thorough security audit. Penetration testing is the final validation of security controls that an organization has implemented. A penetration test exposes security gaps and demonstrates the effectiveness of security controls. We feel that penetration testing should be performed after you are reasonably confident in the security of your systems.
BACK TO TOP

Security Policy Development & Review

A security policy is the administrative component of the controls that provide security to your organization. It is a statement to both your business partners and employees that you consider a secure computing environment a priority in your organization. UTS will review your existing security policy and collaborate with your management and technical teams to develop a customized policy. 
BACK TO TOP


Contact UTS Security Team

   
 
Site Map Contact Us Legal          6533 Blackwell Road Warrenton VA 20187 PHONE 703.625.4600