Prexient IT Security Offerings
Published on: Mar 4, 2016
Transcripts - Prexient IT Security Offerings
© 2015 Prexient, All rights reserved.
1. Information Security Management
The main objectives of information security Management are to in
collaboration with the Customer’s information security organization
– go through the Customer’s current situation and identify the
potential areas for improvement. The consultancy service advises,
determines, and plans with the Customer how the information
security improvements can be executed.
2. Managed Firewall/UTM and IDS/IDP/IDS
Prexient Managed 24 X 7 UTM Service will provide security experts to
handles updates, configurations, and patches, saving you time and
money. Our advanced reporting provides real-time insight into
network activity and our unparalleled compliance expertise reduces
the costs and headaches associated with meeting regulatory
compliance. As a result, Prexient solution empowers your team to
focus on core business activities without security worry. Prexient
UTM Service includes Firewall, IDS/IPS, and VPN Remote User Access.
3. Log Management services:
Prexient log management service collects system event logs from
active network devices, servers, operating systems, and applications
and stores this log information centrally and in an archive for queries,
reporting, or potential forensic investigation purposes. Finally, the
compliance reporting service will provides the auditors with the
required compliance reports.
4. Vulnerability Management
Prexient’s Vulnerability Management provides baseline and discovery
functions in support of vulnerability management. VM scan an
endpoint and attempt to determine vulnerable conditions based on a
database of known vulnerabilities. VM can also determine many
other aspects of the endpoint, including open ports, running services
and protocols, applications, and operating system.
5. 2FA Token Authentication
Two factor Authentication Solutions allow you to easily enable Two-
factor Authentication for access to protected Networks and Security
devices. Two-factor authentication solutions improve security and
reduce the risk of compromise inherent in single-factor
authentication solutions such as static passwords.
Fully managed authentication servers hosted at Prexient
Security Operations Center
Hard tokens, SMS, desktop & mobile soft tokens
Includes integration with customer applications
24x7 Service Desk – installation, PIN resets, replacement,
application configuration issues, lockouts, change/add/delete
6. Managed web Proxy
Prexient’s cloud based Web Proxy Service provides Internet usage
protection for users, enforces Internet usage policies, and protects
user from virus issue, collocation issue, website cashing.
7. Risk Management
Prexient has developed the processes and frameworks to enable
enterprises to meet the Governance, Risk and Compliance
requirements. Prexient GRC Solutions help enterprises to efficiently
manage corporate & IT policies, provide superior reporting
Capabilities on risk and compliance landscape, and thereby enable
informed business decision making. Prexient Service includes ISO
27001, Sarbanes-Oxley Act (SOX), PCI DSS, BASEL II, and COBIT 5.
8. Penetration Testing
Prexient offers Penetration Testing services that build upon each
other and ultimately, help remediate your applications. We can
customize a program based on your security needs. Penetration
Testing is a great way to evaluate the security of an IT infrastructure
safely without exploiting system vulnerabilities. Testing will assess
service and application flaws, improper configurations, and risky end-
user behavior. These tests are helpful when validating the efficacy of
defense mechanisms and, also, evaluating end-user’s observance of
9. Incident Management and vCISCO services:
The Prexient incident response executes rapid containment of threats
which minimizes both the duration and impact of a security breach.
We can help you to prepare for the respond to and recover from even
the most complex and large-scale information security incidents like
cyber-attack, DDOS etc.
10. Auditing and Compliance
Prexient offers Audit & compliance readiness solution. The
compliance readiness solution comes in the form of a Gap Analysis,
Remediation plan, Implementation, Roadmap document and helping
customers to achieve ISO 27001 / PCI certification from any vendors
11. Digital Forensics
Digital forensics is a branch of forensic science encompassing the
recovery and investigation of material found in digital devices, often
in relation to crime. Digital forensics is used of scientific proven
methods for the collection, validation, identification, analysis,
interpretation, preservation, documentation and presentation of
digital evidence. This evidence can be extracted from many digital
sources such as CD/DVDs, hard drives, flash drives, memory sticks,
and magnetic tapes, etc.
Security Services Catalog