Every organization, whether small or large, wants to ensure that its network and data is secured. The exponential growth of amount of sensitive data, evolving mobile technologies, expansion of data centers and cloud computing makes networks and data more vulnerable to attacks and hacks.

One of the greatest challenges in today’s rapidly growing technologies is Security. From strategic advisory consulting, incident response, design and deploy services to cloud security services, netnuvem has the expertise to help you stay ahead of cyber criminals.

Our security services enable you to integrate with threat services, innovate without introducing risk, and mature your program over time. Our experts with multiple industry Security certifications provide a holistic approach for Security design using multi-vendor and open-source technologies.

  • Requirements gathering workshop
  • Assessment and gap analysis report
  • Design workshop
  • Network architecture blueprint
  • Detailed design document
  • Design validation and testing
  • Risk assessment, gap analysis and audit report
  • Proof of concept and demonstration
  • Network implementation plan
  • Network migration plan
  • Operational run books
  • Knowledge transfer
  • Firewall
    • Cisco ASA Next Generation Firewall with Firepower Services
    • Cisco FTD Firepower Threat Defence
    • Firepower Management Center
  • Intrusion Prevention
    • Appliance and Virtual Next Generation IPS
    • Advanced Malware Protection
    • Content filtering
  • Virtual Private Networks
    • IPSEc Tunnels (Remote and Site-to-Site)
    • Dynamic Multipoint VPN (DMVPN)
    • Securing DMVPN Tunnels
    • Flex and SSL VPN
  • Cisco Identity Services Engine (ISE)
    • Active Directory Integration
    • 802.1x wired and Wireless
    • Posture Assessment and device profiling
    • Guest/Sponsor: Bring Your Own Device (BYOD)
    • Firepower Integration
    • pxGrid, AAA services
  • Cisco Next-Generation Endpoint Security
    • Umbrella
    • AMP
    • AnyConnect
  • SIEM and Logging
    • Splunk
    • Elasticsearch
    • HP ArcSight
    • IBM Qradar
  • Network Protection
    • Palo Alto
    • Checkpoint
    • Juniper
  • Host and Endpoint Monitoring
    • Symantec Endpoint Protection
    • Carbon Black
    • Bit9
  • Vulnerability Management System
    • Nessus
    • Acunetix
    • Qualys
    • Tripwire
  • Patch Management System
    • BigFix
  • Machine Learning
    • Prelert (Elasticsaerch
    • Securonix
    • Splunk Machine Learning Toolkit
  • Incident Management (CMDB)
    • RSA Archer
    • ServiceNow
    • BMC Remedy
  • Application Secuirty
    • Klockwork
    • Veracode
    • IBM AppScan
    • HP Fortify
    • Qualys