SECURITY TECHNOLOGY SERVICES

Security Technology Services

Strategic Security ServicesStrategic_Security_Services.html
Secure Product ServicesSecure_Product_Services.html
Managed Security ServicesManaged_Security_Services.html
Assessment and ComplianceAssessment_and_Compliance.html
Incident Response and ForensicsIncident_Response_and_Forensics.html
 

A proper security program must include the technological controls that are necessary to ensure adherence standards.  NetDefend Consulting’s Security Technology Services (STS) provides organizations the ability to engage security tools with accuracy and efficiency.

Security Solutions, Expertly Implemented

A Range of Vendors

Our staff has experience with implementing and correctly configuring information security solutions from a number of leading security technology vendors, including:


  1. CheckPoint

  2. Cisco Systems

  3. F5 Networks

  4. HP (Fortify, TippingPoint, WebInspect, Opsware)

  5. SafeNet

  6. WatchGuard

  7. ESET

  8. McAfee

  9. Symantec

  10. Barracuda Networks

Security Systems Integration and Training

With decades of experience with a wide array of information security technologies, techniques, and tools, NetDefend Consulting’s team of consultants can implement, configure, and integrate new security hardware and software into your current IT infrastructure, saving costs and increasing accuracy.  In addition, our teams include experienced trainers who can provide customized on-site or remote training for most any security solution, whether implemented by NetDefend or not.


Technical solutions with which our team has provided implementation and configuration services include:

  1. Intrusion Detection and Prevention Systems

  2. Host and Network Template Enforcement Solutions

  3. Firewalls and Firewall Architecture

  4. Mobile Device Management

  5. Content Security Solutions

  6. Vulnerability Scanning and Analysis Tools

  7. VPNs

  8. Secure Wireless Network Design

  9. Security Incident and Event Management (SIEM)

  10. Authentication and Identity Management Solutions

  11. Log Analysis and Capture Solutions

  12. Data Encryption Solutions

  13. Systems, Application, and Network Hardening

  14. Business Continuity Solutions