Header Menu
Left-Menu
News
Jan 22th, 2013
Eljay Engineering is now ISO / IEC 27001:2005 Certified to provide Professional Services & Remote Network Management Services worldwide
Dec 11th, 2012
Eljay engineers complete WLAN site surveys for one of the world’s popular accessories chain
November 24th, 2012
Eljay enhances partnership levels with leading storage vendor – NetApp
November 15th, 2012
Eljay signs contract with one of the leading Network Support providers of the USA to provide 24x7 NOC support
September 20th 2012, New Delhi
Eljay Engineering, an IT Infrastructure Management company with a global footprint, opens up its new office in Gurgaon, near New Delhi,India
August 18th, 2012
Eljay Engineering engages with a hosted services provider in New York, the USA, in providing Managed Services
June 20th, 2012
Eljay Engineering renews contract for Managed Services for a large system integrator based out of Scotland.
June 4th, 2012
Eljay achieves the status of Cisco Premier Partner and VMware Registered Partner Certification.
April 18th, 2012
Eljay along with its Cisco Gold Certified partner, a network integrator gets into a contract for a large hardware improvement program for the world’s largest international Information Technology Company, headquartered in France.
March 15th, 2012
Eljay Engineering introduces Remote Design Engineering and remote presales models which is as same as onsite design and presales consulting services.
February 14th, 2012
Eljay Professional Services team delivers global hardware refreshment across the globe for a World Renowned Entertainment Company.
January 5th, 2012
Eljay Engineering’s visionary for the year 2012 is towards focusing on Professional Services on Cisco Advanced Technologies

SOC Services

Security Operations Center – Eljay engineering

Security Monitoring (Security Operations Center)

Monitoring of security events is very critical for proactive Organizations. By providing this service we mitigate the risk of any major catastrophic security breach or the failure of any security components in the network.

Monitoring systems provide alerts based on various behavioral patterns. But it is very important to have an expert look at those events to verify if it is an indication of the security risk, analyze the impact for the customer business and provide recommendation and apply the fix for the event.

Security Operations focuses device monitoring and fixing of devices like PIX, ASA, IDS, IPS, spam filters and event co-relation tool. Each alert is analyzed and appropriate actions taken based on the Security Incident management Process.

Security Device Management

Proper management of the security devices is very essential for business. With the pace of change in technology and enhancement in codes, it is very difficult for most of the organization to have their Security team to keep pace with the changes and develop skills to manage them. Our Security trained professionals are focused on these security platforms and continuously trained on all new upcoming technologies and devices from various vendors.

Security Device Management focuses on Deployment planning, Configuration, Implementation and, log Analysis Device Health Checks and regular management activities are carried out on the Security Devices which includes firewalls, IPS, IDS, Anti-virus and Anti spamware.

Technology:

  • Managing Firewall Services
  • Managing Intrusion Detection & Prevention Services
  • Managing VPN
  • Managing Email & Web Security
  • Managing User – End Devices Security

Network Based Security:

Network Firewall:

Managed Firewall Services offer an integrated system of hardware and software that controls access to your network and defends it with a secure perimeter. The services offer application-level segregation of network traffic with on-going monitoring and management. In addition, we provide monthly reports for the customers with the elements mentioned below.

Firewall Summary Report

  • Total Denied Packets
  • Top Denied Source Addresses
  • Top Denied Destination Addresses
  • Top Denied Protocols
  • Top Denies by Access Control Policy

Network Intrusion Detection & Prevention Services:

We Manage Intrusion Prevention & Detection Services and mitigate a wide range of malicious traffic and attacks to protect the network and sensitive data. We do continuous proactive monitoring with real-time traffic analysis and constantly update the threat signatures. In addition we offer end-to-end implementation, management and customize the signatures & filtering policies also we provide monthly reports for the customers with the elements mentioned below.

Intrusion Prevention Blocked Attack Reports

  • Top Blocked Attacks by Signature
  • Top Blocked Attacks by Sensor
  • Top Source Blocked Attacks
  • Top Destination Blocked Attacks
  • IPS Signature Categories

Intrusion Prevention Summary Reports

  • Top Fired Signatures/Signature Severity
  • Top Attacker Source
  • Top Attacked Destinations
  • Signature Severity Summary by Sensor
  • Top Fired Signatures Severity

Virtual Private Networks (VPN)

Managing VPN makes sure that the tunnels are up and active, it helps that remote offices and remote clients do not lose the connectivity with the head office. We configure and make changes to the VPNs as per customer requirements, also troubleshoot and provide support for IPSec Site-to-Site VPN, Remote Client VPN and SSL VPNs.

E-Mail & Web Security:

Ironport and Content Security Control (CSC) modules are the two devices use to monitor E-Mail and Web traffic. It protects from spam, viruses, and blended threats and prevents data leaks, enforces compliance, and protects reputation. It also provides antispam, antivirus, data loss prevention (DLP), and encryption in cloud.

User-End Devices (Host Based) Security:

Managing User-end devices helps to secure desktops, laptops and servers against viruses, malware, spyware and unauthorized access to end points. We manage end points devices and address the security need by offering a complete range of protection features managed by a single management platform. The services constitute cleaning or containing virus infections and outbreaks, quarantining or removing spyware and preventing unauthorized access on endpoints

Off-Shore – Tasks & Capabilities

  • Provide remote administration of various Cisco Security Products like PIX, ASA, IPS/IDS, MARS, CSA, Ironport, CSC SSM, ACS, ensuring changes met best security practices and would not conflict with current operations
  • Produce monthly reports for customers showing ticket volume, system status, historical reports, and service level benchmarking.
  • Go through the Security Advisories and recommend to the customer, work on the devices affected by the advisories and do the necessary changes to protect it.
  • Analyze IDS/IPS alerts, providing assistance in false positive validation and tune out the false positive alerts.
  • Once the new IPS signature has been released, notify the customer within 24 hours and apply signature updates within 72 hours.
  • Troubleshooting CSA MC, creating rules and application Classes as Per Customer requirements.
  • Troubleshooting WLC and Access Points issues.
  • Troubleshooting L3 and L2 escalated Incident tickets
  • Analyzing IDS/IPS data for 25 separate customers providing assistance in false positive validation and advice on remediation strategies to reduce or eliminate attacks.
  • Consulting with customers to recommend security design and implementation of security solutions that provide high availability and ensures business continuity.
  • Provide monthly vulnerability assessments of customer devices and recommends vendor patches or application changes to correct discrepancies and implement those changes for customers as needed.
  • Generating Monthly reports for IDS / IPS, MARS & Ironport devices and post it in the Knowledge Base portal for all customers.
Footer