Our Security Administration services includes the network security services necessary to ensure network operations IAW with organization’s security policies and procedures.
Our services include monitoring, operating, triaging, and remediation of network incidents from the network core to the perimeter as well as endpoints on the LAN or wireless/mobile networks. Our personnel have expertise in managing Microsoft and Linux operating systems. Our practice is to use ITIL best practices in providing network security support and escalation. We also operate and manage 24/7/365 NOC/SOC for enterprise networks. As a part of these operations, we provide Tier II and Tier III monitoring, critical incident management support, computer security incident response, and IT vulnerability analysis as well as penetration testing. We are very experienced in the use of vulnerability management best practices in order to increase IT security posture and FISMA/FISCAM regulatory compliance. We use market leading tools of ArcSight, TippingPoint, SolarWinds, and many others to provide and automate such services.