Internet Security Management (ISM) is a cloud based security management system. The ISM architecture supports the ISD device and can also support third party security devices. This allows the ISM platform to manage and analyse the complete customer network. The server is built on a security enhanced Linux Operating system, with redundant hardware and mechanisms of seamless failover.

FEATURES

  • Full virtualization service at various levels of granularities.
  • Rich set of tools to manage, monitor and analyse.
  • Extensive logging capabilities.
  • Integrated analysis of all aspects of content, network and user behavior in a
    holistic manner.
  • Executive and technical reports.

SECURITY PROCESS

  • The ISM architecture supports the ISD device and can also support
    third party security devices. This allows the ISM platform to manage
    and analyse the complete customer network.
  • Cutting edge hardware and software architecture provides almost real
    time detection, monitoring and reporting capabilities.
  • Hardware and software redundancy allows it to operate on 24 X 7 basis giving
    carrier class robustness.

INFORMATION AND EVENT MANAGEMENT

  • The ISM platform gives cloud management capabilities.
  • Virtualization at the service level for each customer.
  • Configuration and update capabilities for each ISD.
  • Advanced data correlation for each customer site and across the network.
  • Forensic analysis of the event logs.
  • Real time monitoring of the threats and attacks.
  • All the information that is stored and communicated is kept secure with
    encryption technologies.

ROBUSTNESS AND SCALABILITY

The server is built on a security enhanced Linux Operating system, with redundant hardware and mechanisms of seamless failover.

Dashboard

The dashboard gives a holistic picture of security events and risk levels across multiple devices of the entire network.

Reports

  • Powerful reporting using historical and real time events.
  • Reports output format PDF, Word etc.
  • Flexibility with plug-ins to export and import different objects.
  • Customizable reports can be generated.

Types Of Reports

  • Security events and Alarms
  • Incidents of attack
  • Vulnerabilities
  • Network Statistics
  • Availability of network resources
  • Asset information and Inventory
  • Ticketing system for customer management