+55 (62) 3091-8010 | contato@aser.com.br

Large-Sized Networks

Network environments with more than 500 users

Network with high level of complexity due to the amount of internal assets, flows of people, traveling users and in accordance with the standards of information security. Often goes through auditing processes and receive access of new users, often outside the body of the company. If there are branch offices, seek ensure secure communication and high availability, as generally centralize their services in a single data center.

Management and Firewall Monitoring

  • Website Control and Restriction
  • Secure and Facilitated communication for affiliates through centralized environment
  • Detailed reports with access history
  • Specific rules for groups and users
  • Customized reports with indicators for internal productivity management
  • Settings order to comply with the main market standards
  • Support 24/7

Firewall Management Firewall Monitoring

IDS / IPS

  • Unauthorized access prevention
  • Intrusion detection
  • Indicators of local origin of the attacks
  • Analysis and sorting of false-positive
IDS/IPS

Anti-Spam Gateway

  • Increased user productivity
  • Load reduction in e-mail servers
  • Reduction malware infection
  • Theft reduction information through social engineering
Gateway Antispam

Antivirus Management

  • System updates, bank signatures and patches
  • System Scans
  • Reading and monitoring logs
  • Detailed analysis of threats
  • Local support load reduction
  • Reducing the unavailability of assets
  • Reports and customized alerts
Managed Antivirus

Network Access Control – NAC

  • Ensures that users comply with the compliance policies
  • Prevents network loops
  • Better organization of the network environment
  • Facility for user management and doors
  • Network segmentation via VLANs
  • Standard compliance policies for groups and departments
  • Initiative to PCI-DSS
  • Simplified management and control of new users
NAC – Network Access Control

 

Web Application Firewall – WAF

  • Load reduction in the internal application servers
  • Maximizing the effectiveness of web applications
  • Traffic identification from bots and malicious sources
  • Blocking attacks with multiple layers of protection

WAF – Web Application FirewallWAF Monitoring

Assets, Links and Applications Monitoring

  • View real-time availability
  • Detailed analysis of service quality of the links
  • Call opening and early repair procedures
  • Customized alerts according to criticality
  • Preparation of action and contingency plans
  • Monitoring 24/7
Links and Applications Monitoring

Traffic Monitoring

  • Real time display of incoming traffic and outgoing links
  • Detail consumption by specific period
  • Delivery verification of the contracted speed
  • Graphic comparison of traffic at different times
  • Consumption screening by malicious software
  • Productivity analysis
Traffic Monitoring (ITM)

Link FailOver & Load Balance

  • Avoid interrupting operations
  • Ensure availability of communication
  • Reduce end-user dissatisfaction with the connection speed
  • Reduce internal calls
  • Optimization of band distribution
  • Report with the availability and use of the network indicators
  • Ensure compliance with the SLAs contracted with carriers
Linkf FailOver & Load Balance

Incident Response Team

Highly specialized team able to analyze, and correlate to screen all
kinds of events, for the sake of your company and business. Working 24/7
reducing the response time, create proactive and preventive actions,
detail information and generate tools that enable better internal
management and minimize the negative impacts.

Incident Response Team

Insecurity Management

Project designed to identify vulnerabilities and implement security
policies through:

  • Interviews with all employees
  • Survey and evaluation of physical and logical structures of the company
  • Criticality Mapping
  • Penetration Testing by the attacker’s point of view
  • Action plan preparation and corrections
  • Environmental reassessment for the final delivery of the project

Vulnerability AnalysisIntrusion TestOffensiveSecurity