Information Security Consulting
Solutions for all of your technology needs
Your technology infrastructure is the backbone of your business. Unreliable and outdated systems hurt overall performance and put your bottom line at risk. Micron solves these problems with Inofrmation Security and Consulting services that are custom built to address your requirements. Micron’s IS Consulting experts are highly trained, certified engineers. From minor troubleshooting to complete evaluation, Micron provides solutions for all of your technology needs.
Our consulting services focus on designing and implementing solutions that provide a scalable architecture for distributed, secure, enterprise-quality systems.
Specifically, Micron provides IS consulting services in the following focus areas :
A Stateful firewall (any firewall that performs Stateful packet inspection (SPI) or Stateful inspection) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known connection state will be allowed by the firewall; others will be rejected.
Primarily firewall is deployed at perimeter of network to segregate internal network from internet. Though firewall segregates network with different level of trust it also enforces the access control policies to protect unauthorized access to network resources.
Benefits :
Access control policy Enforcement
Protection from Vulnerable Services
Controlled Access to Site with in the protected subnet
Logging and Statistics of all internet access passes through firewall
Network Intrusion detection & Prevention systems :
An Intrusion Prevention System is a network security device that monitors and prevent network and/or system activities from malicious or unwanted behavior and can react, in real-time, to block these activities. It inspects the network traffic for malicious code or attacks, Application based threats. When a threat is detected by IPS, it can drop the offending packets while still allowing all other traffic to pass.
Benefits :
Access control for network and application-layer traffic.
Protection from Application and database level attacks.
Detect and prevent from intrusions, worms and malicious code.
SSL VPN (Secure Sockets Layer Virtual Private Network) runs on Secure Socket Layers technology and is accessible via https over web browsers. It permits users to establish safe and secure access of network resources from the Internet. SSL VPN provides a encrypted session between remote users and internal network resources with anywhere and anytime access thus improve the productivity for organizations
Benefits :
Clientless cost saving solution
Web browser client access and low dependency
Better security over the web by uses the encryption algorithms
Client device security assessment before establish the connection
External link and server load balancer :
Load balancing is a technonology to spread work between two or more servers, network links, to get optimal resource utilization, maximize throughput, and minimize response time. It uses multiple components with load balancing, instead of a single component and increase reliability through redundancy. Inbound & outbound traffic can be distribute across multiple servers or ISP Links to enhance the performance of the network links and servers and ensures that no single device is overloaded by a technology. Load balancing use the algorithms to load balance the traffic i.e. Least no. of user, Least no of connections, Round robin, Weight, Least traffic, connections and sessions.
Benefits :
Server load-balancing algorithm improves
Provide fault-tolerance and high availability
Application switching allows sending requests web pages to specific servers
Continually monitoring the health checks and Improves Reliability
Content filtering Web Security :
Web filtering is the technology by which URL & Content can be blocked or allowed based on analysis of its URL & content, rather than its source or other criteria. It is most widely used on the internet to filter web access. Blocking access of unwanted web sites and content can be restricting by using as web filtering technology.
Benefits :
Saving Cost, by using web-filtering technology we can block unwanted internet
traffic like orkut.com, youtube.com etc and can save cost of internet.
Saving Time, users will not able to browse entertainment sites, games sites
and can save their time.
Productivity, after restricting unwanted sites and downloading user will only
concentrate on official work and the productivity will increase.
Mail filtering is most commonly used group of methods to filter spam. Mail filters act on the content, Information contained in the mail body, or Mail headers (like Subject) to either classify, accept or reject a message.
Stops spam and phishing attacks using the mail security technology. :
Controls and monitors of inbound and outbound email.
Prevents from viruses and malicious code.
Two-Factor Authentication :
An authentication factor is a piece of information and process used to authenticate or verify the identity of a person or other entity requesting access under security constraints. Two-factor authentication is a system in which two different factors are use in conjunction to authenticate. Two factors authentication delivers a higher level of authentication assurance.
Benefits :
Strong authentication: Token Two-factor authentication provides strong
authentication by requiring something like: Token device, OTP etc.
High security: Two-factor authentication eliminates the security issues
arising from users writing down their passwords, using easy-to-hack
passwords, or using the same password for multiple applications.
Compatibility and ease of integration: Two-factor solution can be use
with a variety of environments like operating systems including (Windows,
Linux and Mac OS) and can be integrate with user database like SQL, LDAP,
and Oracle etc to provide First-factor authentication.
End-Point Encryption :
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).
Benefits :
Encryption Protects and prevents your information data loss from hackers and
assures protection for desktops and laptops against unauthorized access.
Encryption Provides full encryption of data on hard disks, it Provides scalable,
centralized management for easy deployment and administration.
Encryption also Offers boot protection, pre-boot authentication, and pre-boot
event logging and supports Single Sign-On (SSO) to avoid the need to
remember and enter multiple passwords.
Encryption Pre-boot password authentication ensures only authorized
individuals have access to data.
End-Point Protection :
Endpoint Protection combines Antivirus with advanced threat prevention to deliver unmatched defense against Viruses, Malware etc. for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.
Benefits :
Stops malware such as viruses, worms, Trojans, Spyware, Adware, bots, zero-day
threats and rootkits.
Prevents security outbreaks thus reducing administrative overhead.
|
|