Security Solution Technology

Security technologies in today's world change very fast. For every security problem that exists, there can be multiple competing solutions, each with different capabilities, use cases and protection benefits some of which you may not need.  Based on two decades of product and implementation experience, Network Vigilance will guide you through the process that will help you to identify which products and solutions are right for your organization.

Detailed Solution & Technology Descriptions

For further detailed information regarding each solution area, click on the following link:  Technology Detail

The following are a brief listing of security solutions that can be designed, implemented and managed to help you and your organization address security challenges that you may have.

  • Encryption Solutions for Data-At-Rest and Data-In-Motion
  • Intrusion Prevention & Intrusion Detection Systems (IPS/IDS)
  • Security Event Management (SEM/SEIM)
  • Web Application Firewall (WAF)
  • Firewall (Enterprise, Small/Branch Office, UTM)
  • Web Filtering & Proxy Solutions
  • Anti-Spam & Anti-Virus
  • Database Activity Monitoring (DAM) & Protection
  • Application Security
  • Network Vulnerability Scanning
  • Wireless Security & Intrusion Prevention
  • Endpoint Security
  • Network Access Control (NAC)
  • Log Management
  • File Integrity Monitoring (FIM)
  • Policy & Compliance Analysis
  • Change Management
  • Data Leak Protection/Prevention (DLP)
  • Remote Access & Mobile Device Security
  • Distributed Denial of Service (DDOS) Attack Protection & Mitigation

 

Detailed Solution Descriptions

For further detailed information regarding each solution area, click on the following link:  Technology Detail

 


© 2013 Security On-Demand, Inc. All rights reserved