Network perimeter security is the first line of defense in an effective information security program. Network firewalls, whether they be UTM based or next-generation devices form the foundation necessary to protect your organization’s data, network and critical assets from outside intruders and threats. Yet, many organizations continue to be challenged by managing these solutions in-house, due to the heavy technical burden of day-to-day management or lack of available, skilled security expertise.
Datapath’s Managed Next-Generation Firewall service is designed to address all of the complexities associated with the deployment, management and ongoing threat monitoring of these enterprise firewalls, including in-depth support for Cisco and Palo Alto Networks devices.
Managed firewalls are deployed at the network perimeter or within the internal network for additional network segmentation as required by the customer. Service is delivered from a cloud-based management system and supported by the Datapath Security Operation Center team, which provide: Cyber Threat Analysis, Incident Response and Threat Intelligence Analysis. The key roles each of these objectives includes:
Responsible for global threat monitoring and maintaining of specific threat feeds and Indicators of Compromise (IOCs) used for customer site monitoring as well as third party signature / threat updates as required by supported firewalls.
Responsible for customer specific threat monitoring and operation of the Managed Firewall Service on the customer’s behalf, including threat validation, potential attack notifications, escalations and classification of events.
Additional cost services that a customer may choose to leverage from Datapath to assist them with containment, remediation or other incident response operations should they become necessary.
As a proven partner of next-generation firewalls, we have built a thoughtful, streamlined process for helping you secure your perimeter. Here are some of the reasons that organizations choose Datapath:
Efficient deployment of managed firewalls specifically configured for your network, ensuring that monitoring and protection are in effect immediately and monitored continuously.
8×5 M-F service event monitoring quickly identifies evidence of suspicious activity, filtering out non-validated threats with rapid escalation to the customer for validated threats.
Elimination of false positives by Datapath engineers assures that your team stays focused in the areas that matter most and are only engaged when security conditions warrant.
Regular device and policy updates that address the latest network-based threats. In some cases, updates may include protection against zero-day attacks (firewall vendor specific).