Perimeter & Web
Security

The Challenge

Your networks and cloud environments, along with your web-facing assets and systems are under constant attack.

Your users and your systems need to access the internet, but it needs to be controlled and secure.

Firewall rulesets can grow overtime and unmanaged rules can leave you exposed and at risk.

Overview

Our team of experts has been deploying, supporting, and managing firewalls and web security tools for many years.

Our team of qualified experts combined with our best-in-class technology to provide you with the effective and evolving perimeter security covering:

  • Managed Firewall
  • Wireless Security Services
  • Web Protection
  • Penetration Testing for web assets
  • Remote Office Connectivity
  • Cloud Firewalls
  • Reverse Proxy
  • Intrusion Detection and Prevention (IDS/IDP)
  • Vulnerability and Penetration Testing

Benefits

  • Ongoing Firewall managed services to keep you protected
  • Penetration testing of your web-facing assets
  • Web security tools to lock down filtering and prevent malicious sites
  • Threat feed integration for automated disruption of threats


  • Cloud integrated Firewall
  • New Zealand specific threat feed
  • Firewall assessment

Solutions

Web security solutions are important for making sure that you can restrict and monitor your user behaviour on the web, to protect from malicious or harmful sites and to control potential data loss.

SSS has extensive experience deploying and managing web gateways.  To ensure we provide you with effective and evolving Web Protection solutions we have partnered with the best technology providers including:

  • Clearswift SECURE Web Gateway
  • Sophos Firewall
  • Sophos Web Appliance
  • Sophos Unified Threat Management (UTM)

Your firewall plays an extremely important role in protecting your environment from incoming threats. We have developed a service to help you manage your firewall security more effectively and enable your resources to focus their time and efforts on other priorities.

Our service consists of a base offering consisting of:

  • Monitoring during business hours
  • Critical patching
  • Monthly health checks

We offer additional uplifts.

  • Configuration Management – we focus on your rules and applicability of those rules, and change management as needed.
  • Advanced Incident Management – we take your firewall logs, analyse threats, and provide incident management and triage of our findings.
  • High Availability – we increase our response to failure and help you provide a higher uptime and sparing response.

We can help you deploy and manage your wireless networks, so they are up and running in no time. Our wireless security service provides you with:

  • Visibility –  Better visibility so you can see what is happening on your wireless networks, the status of your wi-fi networks, access points, connecting clients, and the environment around you to identify potential risks or inappropriate use.
  • Controlled Access – Providing controlled internet access for visitors, contractors, and other guests. Using a daily password, time-based voucher, or social login that you can customise to display your own branding and terms of service.
  • Scalability – Scale the solution to suit your environment.

Penetration testing is important in helping you understand your application, network, and perimeter-based vulnerabilities that hackers could exploit. Understanding what these gaps are, is the first step towards remediation.

We have partnered with ZX Security to provide you with the following services:

  • External penetration test – Review your presence on the Internet and susceptibility to being compromised, either through misconfigured, unpatched, or insecure servers. Other areas that could be tested include access to administrative interfaces, webmail, and remote access service portals.
  • Internal penetration test – Test whether a consultant can make their way through the network, obtain administrative permissions, and determine if the security team monitoring the network can detect and/or stop the intrusion.
  • Red team engagement – A wide scope test of people and systems for security weaknesses as well as the operational security response to a real-life intrusion.

Our Vulnerability Management as a Service (VMaaS) begins with scans to identify and discover assets within your organisation.  Understanding who and what is connected to your environment is the first step to protecting it.  This information is then contextualised by applying priorities and classifications to critical assets, and automated scans are run to identify vulnerabilities.  Results are analysed and translated into easily digestible action items, for improved management giving you the ability to identify trends and track progress.

 

Our Partners

  • partner-sophos
  • partner-clearswift
  • partner-logo-zx-security
  • partner-paloalto
  • ncsc

Want to know more about our
Perimeter & Web Security solutions & services?

Contact Us