Moves, adds and changes
Supporting your organization
Moves, adds and changes (MACs) are part of the daily routine for most network managers and, in large networks, they can consume significant amounts of skilled time.
Your business also depends on the detailed network knowledge of your IT personnel and staff departures can impact service levels.
Whether it’s changing extension settings or call privileges, reconfiguring a call queue, helping with a Microsoft application or setting up an access list, we can provide the updates smoothly and on time.
The type and volume of MACs required each month are used to determine your service level. Remote MACs that have not been used can be exchanged for other NSOE services – a consultancy visit, a health check or training, for example.
Our MACs service takes the pressure and stress out of these office reconfigurations by providing dedicated resource to carry out the work for you by:
- Pre-project planning and identification of services required
- Co-ordination of all associated services
- Delivery of new power, voice and data outlets if required
- Re-location of existing power, voice and data outlets if required
- Patching of new circuits and provision of desk connections
- Assistance in relocating equipment e.g. PCs, printers, faxes, switches etc.
- On site attendance the next working day to resolve any teething problems
- Update all necessary documentation.
Next generation perimeter security
Secure and compliant communications
Many of our clients are struggling with the need to transact, communicate and collaborate effectively whilst maintaining effective security and compliance.
Clients want to reduce complexity in their security architectures, preventing “appliance sprawl” where complex layered architectures with networking, load balancing & discreet security appliances & applications exist today. These clients also want to reduce operating costs and capital expense, saving valuable data centre footprint and energy costs.
Next generation firewalls have to be flexible, efficient, robust and scalable to add security applications when your business requires them. Businesses want “change ready” architecture where new security applications like intrusion prevention (IPS), application firewalls and anti-virus can easily be added without fundamentally changing the entire architecture.
There are clear business benefits for a client embarking on a security consolidation project with NSOE:
- Total cost of ownership reduced by at least 30% through simplified architecture, faster troubleshooting, reduced support, fewer upgrades and faster application provisioning.
- Up to 50% energy cost reduction for a consolidated security solution.
- All these areas of cost savings are fed into our business case tool to prove the overall ROI of the new solution. There is normally an ROI for the solution inside 12 months.
- NSOE offer a discovery workshop with clients to assess the benefits and ROI of a consolidation project and calculate the return on investment for your project.
Intrusion detection and prevention
Compliance-driving intrusion prevention (IPS)
Compliance is one of the most cited reasons customers tell us they want better IPS capability. Drivers differ according to industry sector, with financial services it’s protecting critical servers and sensitive data. For central government and local authorities it’s maintaining public confidence and preventing mass security breaches. With retail they need to comply with PCI DSS standard and prevent any leakage of cardholder data.
One key client of NSOE needed an IPS solution for their network. The system gets over the traditional flood of false positives and with careful tuning, allows them to focus of the handful of serious security events that could damage their business out of the millions of events the sensors pick up on raw form.
Whatever the driver NSOE has solutions from Sourcefire and Fortinet to address compliance needs.
The cost of doing nothing
IPS technology is not a silver bullet, it is best deployed with other internal controls, such as good password management, segregation, secure remote access and other policies. When considering IPS, customers should weigh up the cost of doing nothing. PCI fines for non-compliance for instance are easy to determine. More difficult to estimate is the damage to brand reputation of a security breach and cost and time of the cleanup operation afterwards.
Data leak prevention
Protecting your business from data leaks
One of the IT industry's top concerns is to prevent leakages - situations where personal data might unintentionally be released into the public domain through something as simple as loss of a laptop.
At NSOE we are working with key vendors to provide a set of tools to manage and control the use of data and provide proactive protection for data carried on removable media - allowing you to:
-
Set device usage policies per user, group, machine or combination
- Set a different device usage policy for network-connected machines and non-network connected machine
- Control who can read and/or write to removable storage devices
- Control how much data a user(s) can copy out each day
- Control what type of data a user(s) can copy out or copy in
- Audit all user activity including actual file contents copied out or copied in (bi-directional shadowing)
- Schedule management reports to be delivered via email or file to network share
- Generate management audit reports with 20 report templates or easily generate customized reports
- Automatically ensure that all data written to removable storage media is always encrypted with strong encryption (AES 256-bit)
Application on control
Secure remote access for business continuity
Business continuity
There will be times you won’t be able to get your staff into your facilities and connected to your network. Is your company prepared? Your employees can be isolated from the office with the occurrences of inclement weather, natural disasters, transportations strikes, fear from pandemic outbreaks, or even terrorists’ actions. These emergencies can have a widespread impact on a company’s ability to support its customers and maintain business continuity. Your employees being isolated for an unpredictable amount of time and without warning and without network access can lead huge productivity losses and a direct impact to the bottom-line.
NSOE offers secure remote access solutions based on SSL technology as the simplest, fastest way of providing application access for your staff, wherever they are located and however they are able to connect to your data centre.
The proliferation of web applications has changed the way we access systems and SSL has quickly become the de facto standard for securing internet communications. SSL protocols are easy for the end user to use because there is embedded support in every browser. Clientless access is attractive for many reasons and is ideal for remote worker access, contractor and 3rd party access to your systems.
At the server end however, SSL encrypted communications are CPU intensive and cause as much as a 75% drop in server performance.
What is needed is appliances sitting in front of your web applications, designed to perform SSL offload and decryption. NSOE designed this solution to handle large volume sessions for remote access solutions and e-commerce sites.
NSOE partners with Microsoft, Nortel, Cisco and Juniper for secure remote access solutions.
Cabling site audits
Gaining insight into your cabling infrastructure
Are your site plans and patching schedules up to date?
Do you know what specification of cabling you have installed?
Are you having cabling problems on site?
Do any of those questions sound familiar?
NSOE can address all of the above to suit your specific requirements. Site audits can be undertaken to:
-
Update site plans with latest outlet locations and cable routes
- Provide health checks of the cabling infrastructure to identify the standards met
- Highlight problems and provide recommendations to rectify identified problems
- Update or produce patching schedules (including complete cabinet tidy ups can be undertaken)
| |
Corporate training |
Quality can only be experienced, not described.
 |
|
CCIE Bootcamp Schedule |
CCIE R&S 10-DAY BOOTCAMP
CCIE SERVICE PROVIDER V3.0 10-DAY BOOTCAMP
CCIE SECURITY V4.0 10-DAY BOOTCAMP
CCIE VOICE 10-DAY BOOTCAMP
 |
|