|
|
Design and implementation network security |
Edge security |
An organisations perimeter security is the first line of defence against external threats.
Sentinel can help provide thorough identification of optimal border security devices, including routers, firewalls, VPN's, load balancing and traffic shaping systems or devices.
Sentinel's commitment to layered security structures provides strong, defence in depth security technology with minimal security management overhead and low total cost of ownership.
|
Firewalls, malware and content |
The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure that will ensure confidentiality, integrity, and availability of mission critical information.
It is a decision that should not be made without a firm understanding of the technology, options, or the potential impacts.
Sentinel Data Security will consider all aspects of your company's needs and will identify the end user community; the relationship between the security product and the organisations mission; the sensitivity of the data; the organisation's security requirements and security policies and procedures. Sentinel will also take into account operational issues such as daily operation, maintenance and training.
As an independent party with no hardware or software product bias, we can design and implement the best Firewall or VPN solution to meet our customers' needs by selecting from all available options.
Given the extensive analysis undertaken by Sentinel prior to making recommendations, you can expect tailored consulting and solutions provided by dedicated security experts who have broad security experience and a passion for their work.
|
Load balancing |
As the daily productivity of organisations becomes increasingly reliant on the internet and inter-office connectivity, ensuring adequate bandwidth control has become crucial.
Sentinel helps organisations determine bandwidth policy, load balancing procedures and scope technology.
This guarantees that business critical network traffic is given priority, and that personal use by employees does not interfere with the delivery of pertinent business related information.
If you provide an Internet based service, turnover will be dependant on the availability of the web based systems to your clients. Sentinel will assist you in managing your resources to ensure that your systems can cope with the amount of traffic by balancing the load between multiple systems.
|
Traffic shaping |
Traffic shaping is the general term given to a broad range of techniques designed to enforce prioritisation policies on data transmission over a network link.
Sentinel can help your organisation prioritise outgoing or inter-office network traffic, giving more important services such as document sharing or email priority over web browsing or other less critical services.
|
Intrusion detection/prevention |
The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure that ensures confidentiality, integrity, and availability of mission critical information.
It is a decision that should not be made lightly, or without a firm understanding of the technology, options, or the potential impacts.
With this in mind Sentinel Data Security have develop a framework to help you select the right IDS solution for your business whilst keeping in mind your information security needs.
The selection of IT security products follows the risk management process of identifying the most effective mix of management, operational, and technical controls.
Once the necessary controls are identified, the most effective IT security products can then be identified to provide for these controls using the framework developed by Sentinel Data Security.
The Sentinel Data Security decision methodology process can be divided into the following steps:
Identify the customer need or requirements
Give customers general understanding of Intrusion Detection Systems
Determine the customers IDS specific requirements
Gain a detailed understanding of the network(s) intended to be monitored/protected
Evaluate various IDS systems compared to requirements
Determine policy and procedures
When evaluating the customers needs and advising on the implementation of a particular IDS solution, Sentinel consider the following; total life-cycle, support, ease-of-use, scalability, product specification with respect to existing and planned organisational program, policies, procedures, and standards.
Sentinel will also identify security critical dependencies on other products and amalgamate the new product's interface with existing infrastructure.
Given the extensive analysis undertaken by Sentinel prior to making recommendations, you can expect tailored consulting and solutions provided by dedicated security experts who have broad security experience and a passion for their work.
|
Network intrusion detection systems |
Sentinel are the leaders in delivery of sophisticated Intrusion Detection System architecture deployment, maintenance and monitoring.
Our consultants are experts in all leading IDS packages, including:
Sourcefire.com Product suite
McAfee Network Security Platform
IBM Security, Network Intrusion Prevention System
Dragon NIDS (Enterasys Networks)
Manhunt NIDS (Symantec)
Intrusion.com NIDS/Taps (Intrusion Inc)
Snort NIDS (A customisable Open Source NIDS)
Bro NIDS (A customisable Open Source NIDS)
Prelude NIDS (A customisable Open Source NIDS)
Sentinel will recommend and install the best IDS system on the market.
Furthermore Sentinel continually attempt to evade these very systems in order to ensure that the highest quality security is maintained.
This ensures Sentinel stays ahead of competition and delivers maximum security to all clients.
|
Host intrusion detection systems |
Sentinel provides several Host Based intrusion detection & prevention systems (HIDS/HIPS). These allow your organisation to create a solid foundation for an effective, multi-layered security strategy.
Whether the HIDS requirement is change detection or change process auditing, our solutions seamlessly install and 'disappear' onto servers, workstations and some network devices.
Sentinel also provides integration into existing NIDS or 'Intrusion Recovery' systems, allowing your organisation to setup several rings of breach detection and disaster recovery.
Detailed reporting and centralised management allow ease of deployment, administration of your integrity management solutions.
|
Honeynets / deceptive networks & systems |
Honey-nets are an old concept which has only recently been employed in the commercial sector. Honey Nets function by creating decoy or 'honey' systems which keep potential attackers away from your real company network, systems and valuable data. Sentinel can provide the very latest in Honey Ney technology, as well as full monitoring and management.
|
Design and implementation of authentication and encryption |
Authentication solutions |
Sentinel provides solutions for strong authentication which can conform to any IT infrastructure.
Should a site require one time passwords, electronic signatures or biometrics, Sentinel can provide an all encompassing solution that allows your company to secure all remote user access with a minimal increase in security management.
These strong authentication solutions extend to extranets, web servers, dial in user services, wireless infrastructure and VPN's using several means, including one-time passwords, digital certificates and tokens.
|
Encryption solutions |
|
PGP and PKI |
The public key infrastructure solutions provided by Sentinel allow you to cost effectively establish a robust, customised PKI and certificate authority system for issuing digital credentials throughout your enterprise.
This allows your users to safely and securely access e-mail, web-mail, networks, VPN's, extranets, secure web sites, portals and any other network enabled device or system. From creating a trusted certificate authority for your organisation, to enterprise wide PKI deployments Sentinel provides start to finish tailored solutions.
|
Email and document control |
The loss of information transmitted through regular e-mail communications can increase a businesses legal liability as well as the risk of private business information being accessed by unauthorised parties.
In order to secure e-mail content, organisations have traditionally turned to standards-based S/MIME solutions. However, due to the complexities associated with deploying the underlying PKI and extending the infrastructure to include external parties, enterprise-wide deployments are rare.
Sentinel provides secure email solutions which allow you to dictate:
Who can read the email, even after it has left the corporate network
Whether recipients can print, copy or save the email
How long the recipient can read that email
Should you decide to alter the privileges or even expire the message entirely, all copies will be altered accordingly, no matter where they are located; on workstations, servers, or backup tapes.
This solution is excellent for short term, contract or new staff who's access to certain information should be limited, as all 'secured' e-mail will eventually expire and no longer be accessible to them.
Today, organisations are under increasing pressure to share their intellectual property and valuable information with colleagues, partners and customers via electronic means.
Typically, organisations implement multiple layers of security such as firewalls, file encryption and authentication to secure information. However, these security approaches do not protect documents once they have been distributed beyond corporate boundaries.
Document control allows organisations to lock down any form of document, MS Office, PDF or other, setting restrictions such as printing, reading or modification.
These restrictions can be set to apply to an entire document or on a per page basis.
Both email and document control mechanisms extend to offline status, meaning, if employees take the restricted document/email offsite they will still be restricted to the policy previously set for that data.
|
|