We provide an extensive range of IT security services which include conducting security reviews and risk assessment, developing policies and standards, recommending and implementing security solutions, as well as conducting security awareness training for different levels of staff. 

 

Consultation and Training

We provide and extensive range of IT consultancy services to help customers deal with the new challenges in the IT and Data security arena. We firstly help our client identify a list of system risks and its potential impacts to the business. Then using a series of interviews with relevant staff, site surveys and system checks, we review the site of enterprise for compliance with the prevailing IT security policies, standards are guidelines, a recommendation on appropriate measures and compensating controls with then be made to eradicate risks posed by non-compliance.  The network is then tested with a suite of scanning tools to provide snapshots of the vulnerability of the network/server. A security policy and plan is then drawn up, and the relevant staff members are also trained and educated to use the system in a way that doesn’t create security risks and keeps the network secure.

 

Data Protection

This the implementation process for the new security system and policy.  This is broken up into 5 main sections

 

1 - Integrated Architecture

Implementation and management of firewalls and network perimeter security – We offer our clients a suite of services to manage the entire life cycle of the network firewalls and related security services. These include installation, configuration, maintenance, and continued auditing and review of the firewalls and their rule-base.

Virtual Private Network Infrastructure – We help clients with remote or multiple sites to effectively extend their network beyond physical boundaries. Our virtual private network infrastructure solutions provide secure logical links among these sites.

 

2 - Content

Intrusion detection -  We assist our clients in the installation of the intrusion detection systems, and the monitoring of networks and hosts for any signs of an attack or unusual behaviour on the network. This allows appropriate counter-measures to be taken before and serious security breach occurs, minimizing damages.

Anti-virus and Content Security -  We provide enterprise-wide anti-virus solutions that are centrally managed, reducing the dependence on individual scanning activities on each machine. We also offer content filtering solutions which are capable of filtering and quarantining online traffic that could potentially contain viruses, based on certain content keywords and other objects.

 

3 - Access

User Authentication – We configure and integrate authentication solutions which enable our clients to identify their users positively. These include enhanced versions of the well-known User ID and Password combination, or two-factor authentication using hardware tokens and smartcards.

Identity Management and Single Sign-On systems are able to provide a centralized view of the users and their access across multiple sub-systems. Our solutions encompass multi-layered authentication and authorization services from a central security management perspective.

Encryption and Smartcards – The design of the encryption protocol and the management of the encryption keys are critical to safeguard the overall security of your information. our application based encryption solutions ensure that your critical information remains secure across servers. Our consultation and implementation capabilities result in a holistic approach, creating maximum security for your critical information

4 - Desktop
We provide desktop security solutions encompassing access control, encryption, patch measurement and personal firewall to secure access to your desktop, protect your data from disclosure and theft, resolve system vulnerabilities and block malicious activities.  Our solutions also facilitate the enforcement of corporate policies at your desktops, hence ensuring that they are secured wherever they may be and that they do not pose a threat to your organisation.

5 - Application
With consistent security being required across multiple layers of applications and product solutions, our application security specialists have the capability to help you with integrating various security components at the application layer.  This ensures that authentication, confidentiality, integrity and even non-repudiation requirements are met consistently across your applications and infrastructure.

Management
Outsource the management and monitoring of your security infrastructure.  Our 24x7 remote and onsite management services enable your organisation to focus on the core business, leaving the management of the security infrastructure in our safe hands. By protecting your connectivity services with comprehensive managed firewall services and VPN, we ensure secure data services and reliable business connectivity to both local and overseas organisations.


      
                  
GO BACK

 
           Data Security
 
Contact ENA for more information about our solutions
home : about us : services : solutions : clients : contacts
Enterprise Networks Australia © 2007 • Privacy PolicyTerms Of Use