IT Security :: IT Enterprise Infrastructure Solutions
Security, Regulatory Compliance, Canadian Government
While business requires that assets and resources are accessible, available and resilient, these requirements must be balanced against the need to mitigate risks to the organization from a wide range of potential and real threats from both external and internal sources.
It is reasonable to conclude from published evidence that the primary motive for the majority of attacks is financial with defamation some way behind. In effect, this makes everyone a likely target, citizens and corporations, since we all have bank accounts, investments and/or removable assets. Just as in house burglary, the opportunistic attacker is the most prolific and there are a host of ready-made tools available on the Internet to use with relative ease. Script Kiddies, those that download and run hacking software with little or no understanding of the technologies, use many of these tools to exploit known weaknesses in networks, operating systems and applications and, with Internet access available almost everywhere, the attack vectors have multiplied considerably in a few short years. The graphic shows that exploitation of known and easily remedied issues still top the charts as they have for the last several years.
Dalian Enterprises Inc. (DALIAN) has been established for 9 years in the IT Security sector and is certified to deliver to both Canadian Government and commercial standards ensuring integrity, confidentiality and availability. DALIAN’s IT Security Portfolio offers a wide range of trusted products and services that support the creation and maintenance of a secure and risk resilient infrastructure, enabling the organization to focus on its core business.
Regulatory Compliance and Risk Management are key requirements for all business but can be complex and expensive to implement. DALIAN offers tools and services that simplify the definition, implementation, maintenance and enforcement of Security Policies and Risk Management enabling business to identify and mitigate compliance risks quickly and accurately. Once properly implemented, continued compliance becomes a business process which can be reported upon by business and administrative personnel.
DALIAN’s IT Security Partnership Profile
| || || |
| Firewall || |
Security Zone policing devices that include stateful packet inspection and/or application layer inspection.
| Unified Threat Management ||Multi-function devices that include Firewall, Anti-Virus, Anti-Malware, Spam Filter (Reputation and Content), Mail Content Filter, Web Content Filter, Reputation based Web URL Filter, Virtual private Networks (VPN) and Intrusion Prevention Systems (IPS). || |
| IDS/IPS ||Intrusion Detection/Intrusion Prevention Systems that operate at either the network or host level to mitigate the damage that cyber-attacks can cause. || |
| Virtual Private Network (VPN) ||VPNs are used to link together users and networks over an encrypted link to ensure the confidentiality and integrity of information. A variety of standards are available including 3DES, AES and SSL. || |
| Content Security (Mail/Web) ||Commonly operating as SMTP/FTP/HTTP/HTTPS Proxies that intercept the traffic flow between local networks and the Internet. Traffic is then inspected for potential threats to the local network such as Malware, Phishing and Unwanted Web Content by category. These devices can include Data Leak Prevention (DLP) capabilities. || |
| Threat and Vulnerability Assessment ||These tools are also known as Penetration Testers and they can be situated inside the network as well as outside. They are used to simulate cyber-attacks and to assess the vulnerability of target devices (hosts, switches, routers, etc). Many can then recommend remedial action. || |
| Security Policy Definition and Enforcement ||Once a Security Policy is defined, it is of little value unless it is policed and enforced. These tools provide policy authoring, distribution, maintenance, policing and enforcement across the enterprise. Some are point solutions while others are modular and centrally managed services. || |
| Identity Management |
and Authentication, Authorization and Accounting (AAA)
|Identification of users and devices on a network is the key to enforcing Security Policy of any kind. Such services include Active Directory, RADIUS, TACACS, LDAP Directories and Public Key Infrastructure (PKI). || |
| Business Continuity and Availability ||Backup, redundancy and resiliency are the watchwords of this category. Power Supply, Environmental and Fire Protection are included. || |
, Regulatory Compliance