Overview
In-depth traffic analysis to identify gaps in existing policies and provide evidence-based recommendations for upgrading the AWS security. This is a custom, service-based implementation for traffic analysis, not a best practices review. Enabling the user to perform real-time traffic analysis and create advanced security policies (phishing prevention, brute force attack signatures, etc.).
The service provides a detailed analysis of 10% of the security policies and their associated profiles, evaluating the impact on the traffic generated by Content-ID. It includes customization of threat reports and security operations, as well as detection of configuration failures and possible breaches. A network-wide reporting environment is enabled, identifying relevant logs to SNMP and SNMP trap.
Three specific policies are also analyzed to generate advanced reports and recommendations, reviewing real-time traffic and rule actions without making changes. In addition, knowledge transfer is provided to up to 12 team members for up to eight hours, with a focus on security gap analysis and attack surface reduction.
- Security policy analysis includes log forwarding, URL filtering, anti-virus checking, file blocking, anti-spyware, DNS protection, vulnerability protection, wildfire scanning, custom EDLs and custom reporting.
- Analysis and customization of threat reports.
- Customization of security operation reports, firewall maintenance, compromise detection and configuration failure detection.
- Identify the generation of logs to SNMP and SNMP trap that are required.
- Analysis of three (3) policies and their associated profiles to create advanced threat reports and recommendation reports.
- Real-time traffic review in security policies.
- Training of up to twelve (12) members of the team for a maximum of eight (8) hours.
Highlights
- Advanced policy and security profile analysis: 10% policy evaluation and customization of advanced reports to identify threats and optimize configuration without modifying existing rules.
- Real-time monitoring and reporting: configuration of a network-wide reporting environment, including SNMP integration and detailed reporting on threats and security operations.
- Specialized knowledge transfer: hands-on training for up to 12 staff members, focused on security breach detection, attack surface reduction and advanced policy management.
Details
Pricing
Custom pricing options
Legal
Content disclaimer
Support
Vendor support
Our Service Level Agreement (SLA) guarantees 24/7* support to ensure uninterrupted assistance for our clients. We commit to a first response time of under 15 minutes, providing prompt attention to your needs. Our SLA includes vendor support to address issues requiring external expertise, ensuring seamless problem resolution. Clients can reach us anytime through Xelco, telephone, email, or live chat, offering flexible communication options tailored to their preferences.
- Restrictions may apply. Contact Netdata for more information at netdatanetworks.com