Managed Security Services
As the leading provider of managed security services in Malaysia, REDtone is a trusted partner of organisations across a wide range of sectors, helping them defend against and defeat security threats.
In a rapidly changing cyber threat environment, the challenges to stay ahead of perpetrators include finding, deploying and managing the latest, most advanced colocation and cloud security solutions.
From strategic consulting, emergency response services, to cloud security and 24×7 managed security services, REDtone has the capability to safeguard against even the most sophisticated threats. We protect the most complex of business environments to give you peace of mind. Protect your information and defend against next-generation security risks.
We are committed to working closely with our clients to understand their security, compliance and cost concerns. This helps us deliver solutions that perfectly fit their specific security requirements while eliminating current vulnerabilities and potential threats. We are certified ISO027001 (Info Security) for ISMS and ISO020000 for ITSMS (IT Service Management).
Our Offerings
Emergency Response Services
Designed to provide resources to assist businesses with computer security incidents or emergency response preparation. As a result, businesses are able to reduce the impact of security breaches faster and more efficiently while gaining a deeper knowledge of such incidents and their infrastructure.
Emergency Response Services
Features:
- Certified analysts and consultants who are specialized in various technical fields across industries
- Security incident response, management and prevention
- Data acquisition and analysis
- Intelligence gathering
- Containment and eradication of threats
- Achieve full recovery from incidents
- Better security management of regulatory compliance
- Flexible usage of purchased service hours
Benefits
Broad Capabilities :
- Active Threat Assessment
- Cyber stress testing
- Payment card industry (PCI) forensics
- Computer Security Incident Response Team (CSIRT) development
Mature Methodology
- Around the clock incident hotline
- Skilled incident analysts respond to over 500 calls every year
Delivery Excellence
- Every project is delivered by certified analysts and consultants around the globe
- Highly skilled and certified CSIRT with the best hardware, software and forensic tools
Managed Network Security Services
A network security solution to protect endpoints, applications, systems, and networks. REDtone’s Managed Network Security Solutions for Firewall, Intrusion Prevention System (IPS), Unified Threat Management (UTM), Proxy, and Host Identity Protocol System (HIPS), simplifies the complexity of firewall management while increasing overall security capabilities and meeting compliance requirements. The solution was designed to help businesses reduce operational overhead associated with the day to day management of core security technologies that provide the foundational elements for the business’s overall security posture.
Managed Network Security Services
Features :
- Support for market leading technologies
- Industry leading service level agreements
- Support for highly comprehensive product features and types
- Integrated service views via the REDtone’s SOC portal
- Integrated security analytics through Global Intelligence Threat Analysis Service
Benefits
- Reduced operational overhead: Faster deployment time and reduced operation overhead
- Multi-vendor environments
- Provides 24/7 support: Round the clock monitoring, response and management
- Compliance and regulatory: Assists with meeting compliance and regulatory requirements
- Enables a simplified and more affordable firewall management
- Helps to reduce security cost and complexity while improving protection
- Facilitates protection of web-based transactions
Managed Security Information and Event Management (SIEM)
Enables businesses to have full visibility, readability and control of all the events happening within their environment. 24/7 monitoring and response by seasoned security professionals for the most complex and challenging environments ensuring that businesses are able to operate efficiently and with more flexibility to meet ever changing business demands. The solution offers real-time threat monitoring, escalation, incident reporting, and remediation assistance designed to stop and reduce the impact of security breaches.
Managed Security Information and Event Management (SIEM)
Features
- Integrates into and supports existing security incident management, process of change management, and other IT-related processes and operational functions
- Full visibility, control and readability access to all collected log events with the ability to create ad-hoc reports
- Provides structured and phased approach of activities: requirement gathering, planning, implementation and ongoing solution management
- Supports complex cross device, cross-division use cases and correlations
- Supports complex structures of compliance requirements and asset profiling
- Support for legacy technologies with the ability to preserve existing IT security management investments
- Industry leading service level agreements
Benefits
- Helps reduce the cost and complexity of managing SIEM technology and resources
- Enables an improved security and compliance posture
- Facilitates operational efficiency and flexibility to help meet changing business demands
Intelligent Log Management
A cloud-based log management service designed to provide businesses with 24/7 monitoring and protection against threats while complying with regulations that require log monitoring. This powerful solution ensures peace of mind for business owners with its flexible features and cost effective value.
Intelligent Log Management
Features
- Automatic updates for changing compliance needs, with routine REDtone updates on compliance dashboards and applications (ex. templates for PCI compliance)
- Policy management and alert monitoring, with a single pane-of-glass alert visibility, empowered by log query and analytics through correlations with IBM’s Security QRadar platform
- Incident forensic and analytic capabilities, powered by X-Force threat analysis intelligence and supported by more than 6000 certified IBM professionals
- Analysts can run searches and correlate events in real time with pre-built searches on log and event data @ Easy and flexible procurement with entry level service at only 100 EPS
- Integrated front-end portal supports ease of use for log query and compliance reporting @ Robust log query search and report schedule interface
Benefits
- Leading Technology – REDtone Threat Insight platform based solution with support of over 500 log sources. Single pane-of-glass view for compliance and audit ready reports
- Cost Effectiveness. OpEx budget model. SaaS solution and rapid enablement
- Flexibility – Variable offerings and entry point service level. Upgrade at any time to meet changing needs
- Peace of Mind. Monitored 24/7 by REDtone’s SOC with support from 9 global IBM SOC’s . On demand service and delivery expertise add-ons available
Hosted Email and Web Security Services
Combats profit-reducing, brand damaging weapons, viruses, spam and spyware being directed at enterprises via a comprehensive cloud-based offering with no technology acquisitions or deployment. It helps businesses mitigate security risks by scanning and quarantining threatening emails before they reach and harm the network. The solution is also designed to help protect IT investments and productivity by reducing the threat of spyware and viruses delivered via web browsing. This cutting-edge technology enables analysis of images, text, file’s etc. which reduces time wasting and keeps unwanted content away from businesses.
Hosted Email and Web Security Services
Features:
Anti-virus protection
- scans emails and attachments for malicious content by leveraging multiple commercial scanning engines for superior accuracy and performance.
Anti-Spam protection
- scans inbound emails for time wasting content and deletes or quarantines the content based on user definable policies. Leverages multiple engines.
Image Control Analyses
- Analyses email messages for images and reviews against a user definable policy and keeps unwanted content out of your organization.
Content Control
- analysis of email content and enables user definable control over file attachment types, email text content and more
Benefits
- blocks inbound and outbound email containing viruses, worms, spam and other malware.
- Delivers email security in-the-cloud to avoid additional hardware or software costs.
- Enforce Internet usage policies by blocking access to inappropriate websites.
- Blocks spyware and viruses before impact.
- Stops confidential information from leaving your company.
Vulnerability Management Services
Detects vulnerabilities across network devices, servers, web applications and databases to help reduce risk and better manage compliance requirements. This agent-less scanner, is able to scan both externally and internally of the firewall to detect vulnerabilities and provide remediation.
Vulnerability Management Services
Features :
Vulnerability Management
- Via agent-less scanning from both inside and outside the firewall, to detect vulnerabilities in customer’s security and networking posture
Remediation Guidance Workflow
- to fix vulnerabilities quickly and easily through the information provided in monthly remediation reports
Database Vulnerability Detection
- to identify vulnerabilities in common databases and database configurations to ensure the customer’s databases are properly postured in security Web Vulnerability Detection Help identify threats such as SQL injections, cross site scripting and other high risk vulnerabilities in web applications of the customer
Intelligent Scanning Deliver
- accurate scan results in less time with a system that follows an assessment process similar to that used by ethical hackers, with fewer false positives
Benefits
- Improved time to value – leveraging an on-demand cloud based platform vs. cumbersome customer provided equipment (CPE) deployment options
- Minimized time and effort – automation and a single solution to cover the broadest set of vulnerabilities
- Improved accuracy of investigations and reduced mitigation time
- Hierarchical access and views let managers distribute the workload of vulnerability management throughout the organization
- Satisfy internal and external scanning requirements
- PCI Compliant Scanning
Need help finding solutions?
Get In Touch
Sales Enquiry
Sales Enquiry
Sales Hotline
1800 87 7770
+603 8084 8070
(if you are abroad)
Email Us
Customer Care
Customer Care
Support Toll Free
1800 87 7790
+603 8084 8910
(if you are abroad)