|
SECURITY
UTS provides proactive management of network
perimeter security. Comprehensive and
affordable managed security solutions
enables businesses to focus their resources
on core operations while maintaining peace
of mind that their information assets are
being watched over.
●
Managed service minimizes cost and maximizes
quality of service
●
24 x 7 monitoring ensures around the clock
protection
●
Daily reporting communicates the latest
information on security initiatives
Managed Firewall |
Firewall management is available in
a variety of configurations to
secure your always on broadband
connection. Firewalls are
configured, installed, monitored and
replaced upon failure. This complete
service provides for 24x7 monitoring
and logging, unlimited policy
changes, firewall updates, firewall
activity reporting and regularly
scheduled vulnerability assessments.
|
BACK TO TOP
Managed Intrusion
Detection |
Network-based intrusion detection
sensors are strategically installed
and configured to detect suspicious
activity. Notifications of high
priority incidents are sent
immediately to the appropriate
incident response personnel.
Recommended response scenarios are
provided with each event
notification. UTS provides 24 x 7
IDS monitoring.
Further
reading on IDS |
BACK TO TOP
Managed VPN |
VPN management extends communication
and connections to home users,
remote workers, partners and/or
mobile users while ensuring the data
being exchanged is safeguarded. This
VPN solution covers all of the
important features. IPSec
compatibility gives you
interoperability with existing
equipment. Des or 3DES Encryption
and SHA-1 or MD5 Authentication
makes sure your data is safe in
transit. |
BACK TO TOP
Managed
Antivirus |
Anti-virus scanners are the front
line technology for preventing virus
attacks. Because anti-virus software
is primarily a reactive measure
against known threats, updating,
detection and policy enforcement
play a key role in meeting the
latest threats and protecting
networks from infection. Updating
your anti-virus software in the
fastest time possible is the only
way to minimize damage to your
network. Today's virus protection is
all about time-to-protection, and by
integrating this security feature
with the firewall additional safety
can be provided with
auto-enforcement and rapid a-mail
attachment blocking. |
BACK TO TOP
Spam
Filtering |
Unlike most spam filtering
solutions, which use one or two
spam-classification techniques, UTS
employs MX Logic’s Stacked
Classification FrameworkSM, which
aggregates the most effective spam
filters and techniques in the
industry, currently leveraging the
strengths of five top spam-fighting
filters.
No contract minimums required and
can be provided on a month to month
basis, thus providing the
opportunity to implement a solution
without a large initial investment
for software; hardware and
administrative time to implement. |
BACK TO TOP
Content
Filtering |
Web content filtering enforces your
Internet usage policy. Integrated
with the firewall management, this
service will provide confidence that
employees are using the Internet for
the benefit of the business and
reduce corporate liability. |
BACK TO TOP
Security Awareness Training |
Education and training are essential
components to any good security
program. People are the most
critical element for the overall
security of an organization. People
are responsible for implementing
security controls. People are
responsible for following security
policy. People make critical
decisions for your organization
every day. Not only must they
understand what to do, they should
also have a firm understanding of
why. Understanding has been shown to
be the largest factor contributing
to employee compliance with security
policy. |
BACK TO TOP
Business Continuance Planning |
Business Continuance Planning (BCP)
is an important piece of any
company's successful recovery after
a malicious act has occurred. To
ensure a full recovery to a state of
being able to continue business as
usual, the BCP should include a
Disaster Recovery Plan (DRP) as
well. Here we have shown a few
things to consider when developing
your BCP and DRP. |
BACK TO TOP
Penetration Testing |
At UTS we consider penetration
testing to be the capstone of any
thorough security audit. Penetration
testing is the final validation of
security controls that an
organization has implemented. A
penetration test exposes security
gaps and demonstrates the
effectiveness of security controls.
We feel that penetration testing
should be performed after you are
reasonably confident in the security
of your systems. |
BACK TO TOP
Security Policy Development &
Review |
A security policy is the
administrative component of the
controls that provide security to
your organization. It is a statement
to both your business partners and
employees that you consider a secure
computing environment a priority in
your organization. UTS will review
your existing security policy and
collaborate with your management and
technical teams to develop a
customized policy. |
BACK TO TOP
Contact UTS Security
Team
|