Managed Security

Managed Security Services

Prioritize security controls for effectiveness against real world threats

Get the first month of service at no cost
OUR APPROACH

Why Redhawk Managed Security Services?

We provide a full range of security services that are managed by certified engineers, backed by information security experts, and tailored for resource-constrained organizations. Clients benefit from proactive, ongoing, expert IT and cybersecurity support, coupled with regulatory and compliance guidance, to manage and monitor your network end-to-end, and everything in between. We can monitor every element of your network infrastructure, from devices and firewalls to switches and routers. Our clients get the peace of mind that comes from knowing their IT is monitored and managed around-the-clock for on-premises, cloud, and hybrid environments. We combine the best technology and IT security expertise to ensure your entire IT infrastructure and devices are monitored and managed continuously against threats and disruptions. This includes configuration, maintenance, remote services, vulnerability scanning, security testing, and incident response.

We provide managed services to fit different needs:

  1. Managed Network Services:Redhawk is an expert at co-managing customer-owned environments, providing 24×7 monitoring, and giving you assistance when you need it
  2. Managed SIEM Service: Provides a comprehensive and integrated service to deliver clients a simple and affordable solution to address digital security threats
  3. Managed Firewall as a Service (FWAAS):Is part of a full range of security services tailored to your business needs, helping to protect your company’s perimeter and enforce policy control
  4. Managed Two-Factor Authentication: Implementing two-factor authentication is the best practice for confirming the identity of your users
  5. Cybersecurity Portal: Delivers a single point for our clients to access security-related documentation and assets

Your Business Is Under Constant Threat

The increase in cyber threats has changed how networks and devices need to be managed. Today’s network infrastructure is more complex, requiring IT teams to constantly adapt and respond to ensure their core network, data, and IT assets are safe from threats.

Security management involves meeting stringent industry and government regulations and compliance. Cybersecurity demands advanced security expertise and management. In fact, according to Gartner, the average cost of IT downtime is $5,600 per minute.

The average cost of IT downtime is $5,600 per minute.

Andrew Lerner

blogs.gartner.com

what we cover

Our Managed Security Services Provide Complete Coverage:

We monitor your network traffic in real-time, including:

  • Check the flows and packet payloads for suspicious content
  • Know what’s connected to your network at all times
  • Monitor potential cyber threats and malicious activity
  • Conduct vulnerability scanning
  • Provide live security Intrusion Protection Service (IPS)/Intrusion Detection Service (IDS) alerting and alert investigation

  1. Firewalls

    • Monitoring of uptime and downtime
    • Availability and configuration backups
    • Firmware management, including patches and updates
    • VPN management
    • Annual firewall failover testing
    • Availability of WAN connectivity
    • ACL and rule management
    • GeoIP exclusions and changes
    • Gateway antivirus exclusions and changes
    • Layer 3 routing management

  2. Switches and Routers

    • Monitoring of uptime and downtime
    • Availability and configuration backups
    • Firmware management, including patches and updates
    • Monitoring of uptime and downtime
    • Availability and configuration backups
    • Firmware management, including patches and updates

  3. Security Operations

    • Intrusion Protection Service (IPS) and incident management
    • Intrusion Detection Service (IDS) and incident management
    • Incident response
    • Port security
    • Managed SIEM
    • Managed threat detection
    • network access control
    • Managed email security
    • Managed UTM
    • analyst incident response
    • PCI ASV scanning
    • scanning, both internal and external
    • state of the network review
    • Cloud and hybrid managed environments

  4. Other Devices

    • Wireless Access Points (WAP)
    • Monitoring of wireless controls
    • Wireless controllers

  5. Support for Leading Vendors

    • AlienVault
    • Cisco
    • Fortinet
    • Meraki
    • Palo Alto Networks
    • SonicWALL

We use a risk-based approach to determine risk levels based on the National Institute of Standards and Technology (NIST) guidance, and specifically, the NIST Publication 800-30: Risk Management Guide for Information Technology Systems. Read more about NITS.

Redhawk Cybersecurity Portal

As an integral part of every solution, we developed the Redhawk Cybersecurity Portal. It offers a secure repository and information resource with a dashboard for customers to track all projects, security assessments, and service tickets. The Cybersecurity Portal provides a single point for our clients to access security-related documentation and assets.

Through the Cybersecurity Portal, each client gets access to:

  • Secure document sharing

  • Escalation procedures and management

  • Trouble ticket tracking and status

  • Network diagrams

  • Firewall rules management

  • Support contracts

  • Archived Managed Security Service (MSS) reports