GECIS - IT Services recognizes the overwhelming security
challenges enterprises face in the open network
era where perimeter security is no longer sufficient. GECIS - IT Services security model addresses challenges proactively
by adopting preventive security strategies and capabilities
to secure all layers of the solution and by rigorous focus
on continuous improvement of security processes.
GECIS - IT Services model provides customers the advantage
of moving away from costly security point solutions that can
be difficult to deploy and maintain. GECIS - IT Services
customers also benefit from mitigated risk for security research
and development, decreased process time and a heightened level
of security readiness.
GECIS - IT Services has employed a number of system level
components, including:
Host based Intrusion detection software
Antivirus tools deployed
at E mail gateways, servers and desktops.
File change monitoring
OS Hardening and standards
Periodic Vulnerability
scanning
Emergency Patch management
and software distribution mechanisms.
GECIS - IT Services security model includes the
following components:
Unified security framework over which technologies
and services are delivered. This preventative and proactive
security foundation integrates key security technologies at
all layers of the solution, including:
Perimeter Security
firewall and network intrusion detection systems
Managed Security Monitoring
Intrusion detection
and data vaulting at the server layer
Vulnerability assessment
and management
Critical security processes that insure quality for
secure reference builds and provide reporting metrics for
continuous measurement. GECIS - IT Services security
best practices leverage use of tools and best practices from
vendors like ISS, Vigilinx, Cisco, to name a few.
Ongoing security awareness programs to address the "human
perimeter" by elevating the importance of security and
employee responsibility through end user education and constant
awareness campaigns.
TOP
|