CSI offers comprehensive range of technical and high-value professional
services, including Network Security, Consulting, Network Security
Auditing, Design, Implementation, Maintenance, and Facility Management.
The CSI Services are:
Assessment of Networks
- Identifying critical network applications requirements
- Checking network health and network performance
- Improving and standardizing network documentation
- Developing network management
- Building disaster and business recovery requirements
- Analyzing total cost of ownership and return on investment (ROI)
Network Design
- Deploying and designing proper Active Directory
- Developing proper multi and hybrid network operating systems:
Microsoft, Novell, Unix, Linux, Mac-OS
- Designing multi-routing and multi-switching architecture: multi-protocol
and multi-layered, VLAN schemes, IP addressing schemes
- Designing, developing and deploying strategy on web filtering,
E-Mail filtering, secure connectivity, load balancing, clustering,
fail-over technologies
- Optimizing wireless connectivity, unified messaging: voice,
fax, and email convergence from low-range, mid-range to mainframe
environments
Deployment and Installation
- Implementing and designing systems and network solution
- Upgrading and enhancing the existing systems and network infrastructure
- Licensing, legal and compliance management
Continued Network Services
- Network operating systems, service pack updates, patch management
- Anti-virus analysis and updates
- Upgrades of existing network infrastructure
CSI Process for Network Security Solutions:
Network Security Assessment
- Router, Firewall, IDS, IPS rule-set, and configuration reviews
- Network, server, and infrastructure assessment
- Active and Passive analysis utilizing various scan technologies
- Internal and external testing using various attack techniques
- Authentication, Authorization and Accounting (AAA) review
- Analysis of information security policies and procedures
Computer and System Network Security Design
- Virtual Private Networks, and Remote Access architectures and
topologies
- Intrusion Detection Systems and Intrusion Prevention Systems
- Firewall architectures, DMZ requirements, and redundancy
- Encryption, and Authentication recommendations
- Wireless Security 802.11x, PEAP, EAP
- Mail Cleanser, Content Filtering
- Anti-Virus, Anti-Spy ware
- SAN and IP encryption
Network Security Deployment
- Monitored and Managed Firewalls, IDS, and IPS
- Implementation of designed security solution
- Verification of deployed security solutions
- Operating system hardening
- IOS System hardening
- Patch Management
Continued Network Services
- Routine scans and vulnerabilities
- Log Reviews and GAP Analysis
- IDS, and IPS tweaking
- Patch Updates
- Documentation, and data archival for compliance requirements
IT outsourcing allows the company to take full advantage of communications
services
and technology, freeing one from the operational and support aspects
of information
systems and enabling one company's efforts to be focused on its
core business activities.
We offer a wide range of professional services including consultation
that specialized
in the IT security field. These offers are intended to educate,
to train, to give and to
transform our clients to be more aware of the security aspect, taking
into account
of company infrastructure, culture and budget.
|