Quick navigation

Dimension Data, part of NTT Group

Dimension Data Managed Intrusion Detection and Prevention Service

Fully managed service that protects networks from attack and misuse, using network-based intrusion detection and prevention systems
Value Proposition

Problem

Intrusion detection and prevention systems are complex technologies that are difficult to manage and maintain. They generate large volumes of complex data and alerts, which require rapid, accurate analysis and interpretation to truly reduce risk. This level of vigilance requires time, effort and specialised expertise… and focusing your internal IT department’s energies on monitoring and managing intrusion detection and prevention systems means you have less time to execute strategic business activities.

Solution

If you’re seeking to implement intrusion detection and prevention systems, without devoting costly internal resources to manage, maintain and monitor the systems, Dimension Data’s Managed Intrusion Detection and Prevention Service can help. We offer a fully managed, 24/7/365 service that protects networks from attack and misuse, using network-based intrusion detection and prevention systems

Features

  • Around-the-clock protection: true continuity of process and constant vigilance
  • Support for solutions from leading vendors: Cisco, McAfee, Juniper, Sourcefire, Tipping Point, Palo Alto, IBM, Fortinet, Industrial Defender and Snort
  • Turnkey daily management: including fine-tuning of filters, software upgrades and patches, and system configuration
  • Rapid intrusion identification, escalation and response using proven processes that ensure security events are responded to and escalated quickly
  • Client security portal that provides the intelligence and analytics you need to easily understand your risks, demonstrate compliance and make better security decisions
Supporting Technology
  • Event management: Performance and availability monitoring and notification, Global intelligence correlation, Vulnerability scan data correlation, Content aware monitoring, Context aware monitoring, Predictive intelligence
  • Security incident management: identification, -investigation, -response & containment, - rectification, restart and monitoring; remote incident diagnosis and troubleshooting, workaround or permanent resolution identification and implementation
  • Asset and configuration management: Configuration and rule-base backup, Patch release notification, asset inventory management, role-based access control, IDS/IPS policy tuning, vulnerability scanning service
  • Change management: Change request process, configuration and rule-base administration
  • Release and deployment management: Patch installations, Configuration and rule-base restore, Signature update maintenance
  • Reporting: Threat intelligence service, Online searching and reporting, Monthly reporting (system generated), Report validation and review
Standards & Compliance
  • ISO27000
  • PCI DSS
Customers

References

Maybank, Allan Gray, ArcelorMittal, Steel & Tube, Mercey Health

Downloads

Video(s)