HeadPic Headpic2
Home About 3-sss Software Networking Consultancy Contact Us Careers
 

Network Services Details


  • Our detailed audits help you create a baseline for your network architecture and a road map for future needs. Recommendations include ways to reduce network outages, improving throughput, optimizing resources, investment and planning for future expansion.

  • We assess your existing network infrastructure, understand your current and future networking needs, and formulate a network strategy and solution design to meet your business needs today and in the future.

  • We plan and implement your networking solution, including project management, installation planning, product installation and customization.

  • These include monitoring and reporting of network availability and performance, configuration management and fault management. These services optimize your network performance and proactively manage operational issues to ensure smooth, uninterrupted running on a 24x7x365 basis.

  • The need for a proactive and powerful security system in today's connected world is a given. At the same time you need to maintain electronic relationships and provide access to a wide audience of partners, from customers to employees. Not only do we help you fortify your business assets and protect critical information, we help you mitigate risk and ensure business continuity, today and in the future.

  • An audit of this nature is carried out to assess the gap between the articulated Security policies of organization vis-à-vis standards like BS7799, SANS The gap between the articulated Security policies of an organization vis-à-vis the actual deployment of the same.

  • This assessment service determines the nature of security vulnerabilities, which exist on the network as well as hosts, and methods of mitigation. The vulnerability assessment covers network equipment like routers, switches, firewalls etc. and Operating systems like Windows NT, Solaris and Linux. This activity is usually performed by executing tool-based scans on network and hosts within the client’s internal network. 3-sss also provides an External Penetration testing Service. The objective is to assess the security posture of Critical Internet facing equipment. This activity is usually performed by executing tool-based scans on network and hosts that are visible on the Internet.

  • Management controls, Physical access , Secure connectivity, Computer usage , User / special access , Computer network hook-up, Router security, Network operating system security , Server operating system security intrusion detection and response , Firewall policy , Email policy, World wide web policy, Escalation procedures for managing breach of security, Security incident handling procedures , Third party network connections, Back up and storage, Data classification policy, Event handling and reporting.

  • As connectivity increases, so does the risk of network attacks. In this environment, two factors drive the need for a security system: the need to maintain the integrity of data communications and the need to protect intellectual property and information assets.
    A secure architecture requires assessment and configuration of every aspect of the network. We recommend an optimal architecture and provide product recommendations. We set up authentication, authorization, access control and data integrity policies as well as best practice policies for all products.

  • Hardening Solutions Unix, NT, Linux, Windows, Web Products, Firewall Checkpoint, Cisco PIX, Gauntlet, Raptor, CA eTrust, IDS ISS Real Secure, ITA Intruder Alert, CISCO NetRanger, AAA Solutions TACACS, Merit, Radius , VPN/Encryption CISCO VPN, Checkpoint SecuRemote, CA Crypt IT , Vulnerability assessment ISS, NAI Cybercop, Cisco Net Sonar.

  • This includes configuration management, backup, archival, software version upgrades and network address translation management
    Management of intrusion detection system Malicious content and Internet filtering: This includes URL screening, Trojans, virus scanning, protection and detection, blocking malicious java applets, etc.
    Management of virtual private network: This includes configuration changes, software upgrades and generation of logs and reports.

  • Today the chances of a security breach in an organization leveraging the Internet for their ongoing business is much more than what it used to be in the past. The key reason behind this increased exposure of organizations to these threats is that because of the adoption of newer technologies, the organizations are also exposed to newer vulnerabilities and there are a lot of “bad guys” out there to exploit these vulnerabilities. Security risks are usually addressed by deploying state-of-the-art security solutions and processes. This could be in the form of firewalls, intrusion detection systems etc. It is true that deploying security solutions from market leaders in respective segments and adhering to ‘Best Practices’ while configuring these solutions improves the security posture of an organization. But there must be a way for organizations to test if the protective measures that they have put together to secure the enterprise is adequate or not. The goal of our penetration testing service is to determine if the protective controls put in place by your organization to safe guard its assets can be compromised. The penetration testing exercise gives your organization the picture of overall security of the infrastructure as seen from the Internet.

  • We improve your network availability through remote monitoring, performance reporting and problem, change and configuration management.

  • An audit of this nature is carried out to assess the gap between the articulated Security policies of an organization vis-à-vis standard like BS7799, SANS The gap between the articulated Security policies of an organization vis-à-vis the actual deployment of the same.