Managed UTM

Network perimeter security is a cornerstone of an effective information security program. Firewalls and Unified Threat Management provide the foundation necessary to protect your organization’s data, network and critical assets from outside intruders and threats. Yet, many organizations continue to be challenged by managing network security in-house, due to the heavy burden of day-to-day management requirements and rising costs.

Overview

Protect your network with Unified Threat Management (UTM) from GTIS managed services. GTIS UTM provides a comprehensive set of integrated network security technologies designed to defend against external threats, while also offering protective measures from the inside of the network out.

UTM also provides rogue device detection and internal vulnerability scanning consolidated into a single appliance and delivered by GTIS as a fully managed service.

GTIS Managed UTM services reduce the burden of network security management, eliminate fragmented network security controls and conform to compliance and audit requirements. As a fully managed solution, GTIS Unified Threat Management extends well-beyond traditional services found in competing offerings.


As a fully managed solution, GTIS Unified Threat Management extends well-beyond traditional services found in competing offerings by providing:

Five Security Operations Centers that provide around the clock support, staffed with security experts who have in-depth knowledge and experience working with complex network environments for highly distributed environments. Save time and money while reducing your burden.

Integrated threat intelligence from SpiderLabs, the GTIS advanced security research team. Let our team of experts worry about your security so you don’t have to. Increase your uptime by preventing security infections and keeping malware out.

Compliance help for any of a number of regulations and industry compliance standards including FFIEC/GLBA, SOX, and HIPAA, and more. We have deep expertise in compliance and can help you navigate the complexity of mandates.

Zero capital investment with long-term reduced, predictable costs.

Features

Visibility into the GTIS UTM service is provided by our award-winning TrustKeeper cloud portal, which provides:

    • Easy reporting access for security status and service performance
    • Log and event data provide support for compliance and audit needs
    • Convenient access from any web browser

The GTIS Managed UTM service includes the following component support:

    • Stateful Firewall
    • Deep Inspection Intrusion Prevention
    • Web & Email Anti-Virus
    • Web Content Filtering
    • Rogue Device and Wireless Access Point Detection
    • Internal Vulnerability Scanning
    • Virtual Private Networking
    • Wi-Fi Hotspot

How It Works

GTIS Architecture

All GTIS technologies are built on our scalable and extensible GTIS Architecture, which includes TrustOS© and TrustedSentryTM. TrustOS is the common software platform that unifies all of our products. TrustedSentry is our standardized hardware model. Together, the GTIS Architecture delivers greater efficiency by allowing for easy scaling and rapid integration across our products, as well as third-party solutions.

TrustKeeper Cloud Platform

Visibility into GTIS services are provided by our award-winning TrustKeeper cloud portal, delivering:

  • Easy reporting access for security status and service performance
  • Log and event data provide support for compliance and audit needs
  • Convenient access from any web browser

Services

GTIS Managed Threat Analysis Service is after all, a service. We guide customers through provisioning, registration and secure information synchronization setup, initial SIEM correlation setup with the 19 included TTCS correlations, test the service with the customers SIEM to ensure the service is functioning and operational, and provide knowledge transfer on the service to Security Analysts and Business owners.

Setting up the service is completed typically within a day. Most customers choose to have services delivered on-site however services can also be delivered remotely.