N Ne et tw wo or rk k S Se ec cu ur ri it ty y A As ss se es ss sm me en nt t

abusivetrainerΔίκτυα και Επικοινωνίες

20 Νοε 2013 (πριν από 3 χρόνια και 4 μήνες)

63 εμφανίσεις



Founded in 1995, GALIX is a leading BEE provider of “Information Security” products and services,
combining skills and experience with various offerings for the SMB and enterprise market. Our successful
partnerships with various industry leading vendors has enabled us to have access to the preferred
“Information Security” technologies, thus allowing us to offer unbiased “best-of-breed” solutions to the
market place in South Africa, and other Southern African countries.
The successful combination of security specialized skills, such as CISSP from isc2.org, and Network
certifications such as Microsoft, HP Networking, Cisco, CheckPoint, Celestix, Barracuda, Novell,
TrustWave, Symantec and SonicWALL, makes GALIX your preferred choice for a security partner.
An increasing number of security breaches occur every year as the result of security technology being
incorrectly deployed. GALIX offers a comprehensive range of security services, to back up its selection of
industry-leading products. As part of these services, GALIX does a Network Security Assessment based on
the ISO 27001 / 17799 Standard. The assessment checks Network Security Layer 2, 3 and 7 of the OSI
model and provides a Gap Analysis report on how to address any potential issues. These are some of the
areas covered:

> Network Boundary Protection design and implementation (includes Firewalls and Secure Remote Access)
> Design, implementation and configuration of corporate network (includes LAN, VLAN and WLAN)
> Internal Network Vulnerability Scan and Patch Management
> Network Services and Access Control
> Network Authentication, Logging and Reporting
> Network End-Point protection (includes Anti-Malware and Content filtering)
> Network Intrusion Prevention/Detection Systems
> External Services Vulnerability Scan

GALIX follows two proprietary methodologies to determine and address customers' security requirements.
The QuickStart Methodology is designed to get a customer's Information Security technological defenses up
and running in the shortest possible time. It is ideal for organizations where a security policy already exists,
and an investment has already been made in security technology, but the systems are not optimally deployed
and managed. It is also suitable for organizations with less complex networks and security requirements.

The OPSA Methodology is a more comprehensive approach for organizations with complex networks and
advanced security requirements. It includes a thorough process of assessment, planning and design, testing
and training. This methodology is designed to meet the requirements of heavy-weight corporates.
For more information on Information Security products and services, please visit
http://www.galix.com


N
N
e
e
t
t
w
w
o
o
r
r
k
k


S
S
e
e
c
c
u
u
r
r
i
i
t
t
y
y


A
A
s
s
s
s
e
e
s
s
s
s
m
m
e
e
n
n
t
t




M
M
a
a
k
k
i
i
n
n
g
g


e
e
-
-
B
B
u
u
s
s
i
i
n
n
e
e
s
s
s
s


p
p
o
o
s
s
s
s
i
i
b
b
l
l
e
e