{"id":87,"date":"2013-08-05T08:57:43","date_gmt":"2013-08-05T08:57:43","guid":{"rendered":"http:\/\/localhost\/dcaresg\/?page_id=87"},"modified":"2013-08-05T12:22:44","modified_gmt":"2013-08-05T12:22:44","slug":"security-support-services","status":"publish","type":"page","link":"https:\/\/www.dcare.com.sg\/?page_id=87","title":{"rendered":"Security Support Services"},"content":{"rendered":"<p><strong>Security Support Services<\/strong><br \/>\nNetwork security is now a mission-critical concern for enterprises. Advanced threats from cyber-terrorists, disgruntled employees, and hackers demand a methodical approach to network security. In many industries enhanced security is not an option \u2013 it\u2019s mandatory. Standards and regulatory bodies put increased thrust on implementing stringent security programs to protect digital assets.<br \/>\nWe offer comprehensive managed information security services, by managing security assets at various layers of your enterprise IT assets, including , Perimeter, Network, Host, Application &amp; Data. Our comprehensive suite of security services starts form monitoring the availability of information security assets to on-line monitoring of authentication process, integrity of security policies, events, alerts, and performance of these products. The security elements we manage at various layers of your IT assets are:<\/p>\n<p>&nbsp;<\/p>\n<table width=\"97%\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" align=\"center\">\n<tbody>\n<tr>\n<td height=\"25\">\n<table width=\"100%\" border=\"1\" cellspacing=\"1\" cellpadding=\"3\">\n<tbody>\n<tr>\n<td bgcolor=\"#DFDFDF\" height=\"66\"><strong>Perimeter<\/strong><\/td>\n<td bgcolor=\"#DFDFDF\">\n<ul type=\"disc\">\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Firewall<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Network-based anti-virus, Anti Spam<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Content Security &amp; URL Filtering<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>VPN encryption<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#F8F8F8\" height=\"79\"><strong>Network<\/strong><\/td>\n<td bgcolor=\"#F8F8F8\">\n<ul type=\"disc\">\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Intrusion detection \/prevention system (IDS\/IPS)<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Vulnerability management system<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Endpoint security compliance<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Access control \/ User authentication<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Network Admission Control<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#DFDFDF\"><strong>Host<\/strong><\/td>\n<td bgcolor=\"#DFDFDF\">\n<ul type=\"disc\">\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Host IDS<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Host VA<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Endpoint security compliance<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Anti-virus<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Access control\/user authentication<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#F8F8F8\"><strong>Application<\/strong><\/td>\n<td bgcolor=\"#F8F8F8\">\n<ul type=\"disc\">\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Host IDS<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Host VA<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Access control\/user authentication<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Input validation<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#DFDFDF\"><strong>Data<\/strong><\/td>\n<td bgcolor=\"#DFDFDF\">\n<ul type=\"disc\">\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Encryption<\/li>\n<li><em><strong>\u00bb\u00a0<\/strong><\/em>Access control\/user authentication<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Our services also include periodic threat and vulnerability analysis, by doing industry standard penetration tests. We also provide configuration management, change management and remote problem management, through on-site practices and also through our Remote Infrastructure Management Center.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Support Services Network security is now a mission-critical concern for enterprises. Advanced threats from cyber-terrorists, disgruntled employees, and hackers demand a methodical approach to network security. In many industries enhanced security is not an option \u2013 it\u2019s mandatory. Standards and regulatory bodies put increased thrust on implementing stringent security programs to protect digital assets. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":82,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_links_to":"","_links_to_target":""},"_links":{"self":[{"href":"https:\/\/www.dcare.com.sg\/index.php?rest_route=\/wp\/v2\/pages\/87"}],"collection":[{"href":"https:\/\/www.dcare.com.sg\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dcare.com.sg\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dcare.com.sg\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dcare.com.sg\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=87"}],"version-history":[{"count":4,"href":"https:\/\/www.dcare.com.sg\/index.php?rest_route=\/wp\/v2\/pages\/87\/revisions"}],"predecessor-version":[{"id":112,"href":"https:\/\/www.dcare.com.sg\/index.php?rest_route=\/wp\/v2\/pages\/87\/revisions\/112"}],"up":[{"embeddable":true,"href":"https:\/\/www.dcare.com.sg\/index.php?rest_route=\/wp\/v2\/pages\/82"}],"wp:attachment":[{"href":"https:\/\/www.dcare.com.sg\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=87"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}