netpersist solutions group
CONTACT US
Overview
Vulnerability Assessment
Design and Implementation
Ongoing Security and Performance Monitoring
HOME
Ongoing Security and Performance Monitoring
 
 
NetPersist's ongoing security and performance monitoring services involve connecting a hardened monitoring appliance to your network, which continuously monitors your computers and network devices for security and performance vulnerabilities, and provides easy-to-understand answers to everyday security, performance, and Internet usage questions.

We are responsible for performing ongoing monitoring and maintenance of the system, and you access our reports on-demand via a secure web-based interface.

The information we provide is designed specifically to make it easy for you to identify security and performance vulnerabilities before they become outages or security breaches, but it is also invaluable for rapidly pinpointing the problem if a security incident or outage does occur.
 
Business Benefits:
 
Bandwidth cost savings - less wasted bandwidth can enable reductions in bandwidth overage penalties or burstable bandwidth limits, and lower monthly telecom costs
Improved employee productivity through reduction in Internet mis-use and downtime from outages or security incidents
Avoidance of revenue loss, legal fees or fines from downtime of business-critical applications, compromised corporate data, or non-compliance with Payment Card Industry (PCI) requirements
Superior cost-effectiveness compared to purchasing, implementing, and maintaining separate commercial products in-house
IT Benefits:
 
Unprecedented visibility into what is happening on your network, and what devices or links are vulnerable to compromise or are under-performing/over-utilized
Ability to rapidly detect and respond to performance degradation or virus/worm outbreaks if an incident does occur, and monitor your network provider's Service Level Agreement (SLA) compliance
Secure, non-intrusive operation; service can usually be up and running in 4 hours or less
Ability to monitor a wide variety of platforms including Microsoft, Linux, and Unix-based computers and almost any network device, in both in-house and outsourced environments
Best Suited For:
 
Companies with limited or over-burdened I.T. resources looking for an affordable, non-intrusive way to facilitate troubleshooting and move towards a regular program of proactive maintenance
Companies with dedicated I.T. security resources who need a centralized, flexible, and best-of-breed tool for collecting and reporting security and performance information 
Corporate security managers wanting to validate adherence to security policies and procedures on an ongoing basis, rather than rely on periodic security audits which become out-of-date quickly
Merchants required to provide proof of compliance with the Payment Card Industry Data Security Standard (PCI DSS) to their merchant bank / acquirer
Available Services:
 
Automated Internal Port and Vulnerability scanning,
Internal PCI Compliance Scanning (PCI DSS 11.2.1)
Real-time and Historical Network Usage Profiling
Anomalous Traffic Pattern Detection
Internet / VPN / WAN Link Performance Monitoring
Device / Server Performance Monitoring
Centralized Event Log Collection and Monitoring
 
  Copyright 2002. NetPersist Solutions Group Inc. All Rights Reserved.