
Today’s organizations rely on highly available, secure computing environments to efficiently and safely conduct businesses
Firewalls are a key component of a secure network and must be managed properly to ensure they protect your critical information assets.
Firewalls are configured to allow “good” traffic in and to keep “bad” traffic out. Firewalls are updated continuously to support changing business requirements such as:
- Change in VPN users
- Employee status changes
- New Applications or integrations
Service Overview
ITS’s Managed Firewall Service provides 24×7 proactive administration of your firewall infrastructure. ITS’s certified security experts will perform all activities necessary to keep these devices operating at peak performance including:
- Site assessments
- Firewall policy design, equipment installation and configuration
- Log monitoring
- Firewall monitoring and management
- Comprehensive reporting and emergency response
ITS manages all market leading firewall technologies including Cisco, Check Point and Juniper.. Our experts hold certifications from leading vendors and have deep experience managing these technologies in all types of environments, from the simplest to the most complex. This enables your team to make the right technology choices, while allowing us to support your current and future firewall infrastructure.
Our experts will monitor your firewall logs for security events in real-time. Firewall logs are an extremely valuable source of security information. By monitoring these logs our experts can identify malicious activity including previously unknown, zero-day attacks. Our experts will also monitor your firewalls for performance and availability to ensure your business never goes offline.
Service Features
- Rule set changes and validation
- Configuration changes
- Firewall upgrades
- Patch management
- General maintenance
- Backup and recovery
- 24×7 security event monitoring
- Performance and availability management
- Strategic network planning
- Fault analysis
- On-demand report
- Offering consultancy support & advice
- Developing guidance and policies
- Testing your systems against hacking