+27 (0) 11 673 0835      |      +27 (0) 83 509 2016 info@wirespeed.co.za

SOLUTIONS

Solutions

Wire Speed Systems enterprise cybersecurity architecture is used to manage the capabilities that deliver audit, forensic, detective, and preventive controls to the enterprise. This framework provides for consistent management of security capabilities and assists in prioritizing their deployment, maintenance, and upgrades over time.

It also provides strong accountability and good alignment of strategy, staffing, budget, and technology to meet the security needs of the organization. It is designed to be flexible and scalable from a very small enterprise up to a very large one. It provides an extensible mechanism for adjusting cyberdefenses over time in response to changing cyberthreats. The Products and solutions  that we provide at Wire Speed systems ensure that the eleven domains are well taken care of .The solutions that we provide are to address security challenges in both the Perimeter-based (Legacy) networks as well as the Morden Perimeter- less/Borderless networks .

The eleven functional areas for this enterprise cybersecurity architecture are as follows:

Systems Administration

provides for secure administration of enterprise infrastructure and security systems, and protects system administration channels from compromise

Network Security

provides for security of enterprise networks, their services, and access to them from the Internet and internally connected devices

Application Security

provides for the security of enterprise applications using security technologies that are appropriate to and tailored for the protection of those applications and their communications

Endpoint, Server, and Device Security

provides for the protection of endpoints, servers, and devices that access enterprise data, and protects them from compromise

Identity, Authentication, and Access Management

provides for identification, authentication, and access control throughout the identity life cycle including provisioning, re-certification, and de-provisioning

Data Protection and Cryptography

provides for the protection of data stored in the enterprise and the use of cryptographic technologies to perform that protection, as well as to support other operations such as authentication, non-repudiation, and data integrity

Monitoring, Vulnerability, and Patch Management

provides for the regular monitoring of security infrastructure, scanning and analysis of vulnerabilities in that infrastructure, and management of patches and workarounds to address those vulnerabilities

High Availability, Disaster Recovery, and Physical Protection

provides for the protection of availability in the enterprise, including making systems highly available, recovering from disasters, and physically protecting facilities, people, systems, and data

Incident Response

provides for the investigation, response, and recovery of incidents that are identified through monitoring of the enterprise

Asset Management and Supply Chain

provides for the accounting of enterprise assets, procurement information associated with them, their life cycles, changes, and ensuring orderly and secure disposal without compromise of enterprise data or security

Policy, Audit, E-Discovery, and Training

provides for policy oversight of controls and audit of their effectiveness, support for legal e-discovery activities, and training of staff in proper security policies and practices

SOLUTIONS