Solutions

Effectively plan, design, implement, support and monitor a highly secured IT environment while optimizing the delivery of the IT services in the organization. Our unique model, ADAM, is designed to ensure the quality of our work.
menu-06.pngmenu-06.png

Analyse

Information is everywhere. An enormous number of business transactions are generated everyday, and with the increasing complexity of today’s networks and the enormous changes in the way people work, the analysis phase is essential to understand how production networks and systems should work for a particular customer. In order to identify network pain points, we apply extensive algorithms inspired by humane medical treatments. This involves the following factors: History, configuration, demography, compliance, risk and feasibility. Through manual and machine methods, we extract, analyse and prioritise information. This feeds into our next phase, Decision Making. Concepts used at this stage may include:
  • Network Behaviour Analysis  
  • Network Forensics 
  • Deep Packet Inspection  
  • Security Information & Events Analysis  
  • Gap Analysis and Risk Assessment 
  • Network and Application Vulnerability Assessment 
  • Network and Application Performance Monitoring 
  • Wireless Spectrum Analysis 
  • Human-to-human Meetings and Workshops.

Decide

Maybe it sounds trivial, but this phase is one of the most important aspects of information security. The ability to have quick, firm, yet accurate and correct decisions is a key factor for successful information security system. In this phase, we focus on the strategic level and the overall information security management framework rather than specific technologies. The goal is to unite the isolated decision entities and apply an effective decision making system.

Definition: Decision-making is the study of identifying and choosing alternatives based on the values and preferences of the decision maker.

Fact: Logical decision-making is an important part of all science-based professions, where specialists apply their knowledge in a given area to make informed decisions. However, in situations with higher time pressure, higher stakes, or increased ambiguities, people use intuitive decision-making rather than structured approaches, and arrive at a course of action without weighing alternatives.

Conclusion: many times, alternative solutions are missed out. Building security systems based on logical, structured decision making process can save IT many surprises, uncertainties and eventually, helps to avoid solving a current problem by introducing a new problem.

Inspired by medical decision making, we categorise the decision making phase in four levels: Straight Forward; Low Complexity; Moderate Complexity; and High Complexity. This involves the following factors: number of possible solutions, problem data amount and complexity, and risk of business impact. The outcome of this process, the decision, is fed into the next phase which ensures an optimal action.

Act

We believe in organic growth for networks. Transforming legacy networks into next generation does not mean starting from scratch. When we introduce a solution to an identified problem, we examine the interaction through which the newly introduced solution delivers its planned effect. By implementing this approach, we ensure efficient use of resources, feasibility, quicker time to realise solution value, robustness, and ability to adapt to future needs. This stage involves planning, design, delivery and continuous monitoring of the solution identified in the Decision Phase. Concepts used at this stage may include:
  • Network Security (Firewalls, IDS/IPS, VPN, NAC, UTM) 
  • Web Application Security  
  • Data Traffic Steering and Service Availability 
  • Disaster Recovery  
  • WAN & Wireless Optimisation (Acceleration, Compression, Caching, Qos) 
  • Secure Remote Access 
  • Enterprise and Military-Grade Endpoint Security and Control    
  • Data Leak Prevention, Data Encryption and Database Security 
  • Identity Management, Single Sign On, and Multi Factor Authentication 
  • Content Security, Web Filtering and Application Control

Monitor

Traditionally, IT networks and security projects have been delivered in a waterfall, stage by stage model. We at Fireware have identified this as a broken model. IT network and security solutions are not delivered completely by implementing the technology. More vital phase, mostly ignored, is the continuous monitoring after the initial implementation. Our Agile delivery methodology is designed from the ground up based on this fact. 

Identifying leading indicators of ‘acute’ network health problems is difficult, because one set of fixed monitoring thresholds does not fit all. Every network has distinct monitoring baselines, and each on of these baseline profiles change every day. Being able to identify subtle leading indicators of serious network and security problems requires that vital sign alarm thresholds be continuously adapted to our distinct and continuously changing baselines. Brainlike solutions suit these health monitoring requirements perfectly, because Brainlike sensing has been specifically designed to be both highly adaptive and highly efficient.

When the number of corporate users increases and network resources grow up, the ability to monitor the status of the network and security infrastructure become a critical success factor for IT managers. We help you to implement a centralised monitoring system to observe the small details that may affect the big picture. Keeping an eye on every resource in your infrastructure eliminates hard time surprises and ensures smooth and continuous business operations. Our solutions for this phase include:
  • Security Information and Event Management
  • Security incident response management 
  • Automation 
  • Penetration Testing 
  • Security Business Intelligence
EMEA Information Security Solutions - All Rights Reserved - Fireware Networks © 2015