UTM | UNIFIED THREAT MANAGEMENT

WHAT IS UNIFIED THREAT MANAGEMENT?

RedLegg works to fully understand your network, segmentation needs, and access requirements to build a custom UTM policy prior to deployment.  RedLegg’s UTM services offer industry leading firewall and VPN technology while also providing optional Next-Generation security features such as...

  • Anti-virus
  • Intrusion Prevention
  • Web Filtering
  • Application Control
  • Data Loss Prevention
  • Email Filtering
SIEM-Pillar-Banner

Pretty much everything you'd need to know about co-managed SIEM. 

LEARN MORE

SECURITY OPERATIONS CENTER

Managed Security Services are implemented and delivered by the RedLegg Security Operations Team.

24X7 SUPPORT:

The RedLegg Security Operations Team is available 24x7 for customer support, in your time zone.

MONITORING:

RedLegg’s Security Operations Team enables monitoring and alerting for your on-premise equipment, based on your pre-defined escalation procedures.

TICKETING:

The ticketing system is available online to track all cases, and a customer portal is available as well to check the status of tickets.

ALERTING:

For threat detection services, RedLegg will configure automatic alerts based on pre-determined criteria or critical services.

UTM DEPLOYMENT

At the outset of a new UTM deployment engagement, RedLegg will work with you to gather all information and guide you through a step-wise deployment process.

PHASE 1:
PROJECT KICK-OFF

During the initial kickoff, RedLegg Security Operations staff will walk through the scope of the project and services.  The goal is to identify and complete the following items:   

  • Services deployed
  • Project leads and contacts
  • Deployment/handoff schedule or deadlines
  • Data Gathering Form
  • Acceptance Testing Plan

The Data Gathering Form will be explained and delivered to you at this time.  This form is the primary tool used by the RedLegg Security Operations staff for pre-configuration of UTM devices.

PHASE 2:
DATA GATHERING

For all new firewall deployments, RedLegg will provide the Data Gathering Form to assist in collecting the information required by the RedLegg SOC for proper configuration and deployment of the security solutions.  The following information is collected in the form:

  • Your contact details
  • Escalation procedures
  • Networking information (diagrams, IP addresses)
  • Access rules
  • VPN information

PHASE 3:
TECHNICAL REVIEW

Once you have completed the Data Gathering Form, RedLegg will review the information, verify that the data is correct, and make sure that any last-minute questions are answered.  Critical at this stage is the verification of network configuration information.  In the event of an existing deployed solution, RedLegg will conduct a review of the current policy with the customer to verify the rules and configuration.

PHASE 4:
CONFIGURATION

After the Technical Review, RedLegg will configure the UTM appliance based on the technical details from the Data Gathering Form, and ship to the site based on the pre-determined installation schedule. 

PHASE 5:
INSTALLATION

On the date of installation, RedLegg will assist on-site staff with proper cabling and installation of their Log Collection appliance.  The installation process follows these general steps:

  1. Cable and power-up devices.
  2. Verify network and internet connectivity.
  3. Verify RedLegg management connectivity.
  4. Perform acceptance testing.
  5. Enable monitoring.

The installation is complete.

PHASE 6:
ONGOING

After the installation is complete, RedLegg will commence ongoing management and monitoring of the deployed UTM device. 

  • PHASE 1:
    PROJECT KICK-OFF
  • PHASE 1:
    PROJECT KICK-OFF

    During the initial kickoff, RedLegg Security Operations staff will walk through the scope of the project and services.  The goal is to identify and complete the following items:   

    • Services deployed
    • Project leads and contacts
    • Deployment/handoff schedule or deadlines
    • Data Gathering Form
    • Acceptance Testing Plan

    The Data Gathering Form will be explained and delivered to you at this time.  This form is the primary tool used by the RedLegg Security Operations staff for pre-configuration of UTM devices.

  • PHASE 2:
    DATA GATHERING
  • PHASE 2:
    DATA GATHERING

    For all new firewall deployments, RedLegg will provide the Data Gathering Form to assist in collecting the information required by the RedLegg SOC for proper configuration and deployment of the security solutions.  The following information is collected in the form:

    • Your contact details
    • Escalation procedures
    • Networking information (diagrams, IP addresses)
    • Access rules
    • VPN information
  • PHASE 3:
    TECHNICAL REVIEW
  • PHASE 3:
    TECHNICAL REVIEW

    Once you have completed the Data Gathering Form, RedLegg will review the information, verify that the data is correct, and make sure that any last-minute questions are answered.  Critical at this stage is the verification of network configuration information.  In the event of an existing deployed solution, RedLegg will conduct a review of the current policy with the customer to verify the rules and configuration.

  • PHASE 4:
    CONFIGURATION
  • PHASE 4:
    CONFIGURATION

    After the Technical Review, RedLegg will configure the UTM appliance based on the technical details from the Data Gathering Form, and ship to the site based on the pre-determined installation schedule. 

  • PHASE 5:
    INSTALLATION
  • PHASE 5:
    INSTALLATION

    On the date of installation, RedLegg will assist on-site staff with proper cabling and installation of their Log Collection appliance.  The installation process follows these general steps:

    1. Cable and power-up devices.
    2. Verify network and internet connectivity.
    3. Verify RedLegg management connectivity.
    4. Perform acceptance testing.
    5. Enable monitoring.

    The installation is complete.

  • PHASE 6:
    ONGOING
  • PHASE 6:
    ONGOING

    After the installation is complete, RedLegg will commence ongoing management and monitoring of the deployed UTM device. 

UTM MANAGEMENT

  • HEALTH AND PERFORMANCE
  • AVAILABILITY AND OUTAGE NOTIFICATIONS
  • PATCH AND SOFTWARE UPDATES
  • POLICY MANAGEMENT
  • POLICY BACKUP

HEALTH AND PERFORMANCE

Health and performance of the appliance is monitored by RedLegg operations.  In the event of a system or performance issue, the RedLegg SOC is notified so that problems can be investigated.

AVAILABILITY AND OUTAGE NOTIFICATIONS

Availability of the equipment is monitored 24x7.  In the event that the device becomes unreachable, RedLegg SOC staff will begin investigation of possible network connectivity issues.  In the event that the device remains unreachable for the determined threshold, you will be notified using the escalation procedures established in our Data Gathering Form.

PATCH AND SOFTWARE UPDATES

When new software or signature updates or patches are available, RedLegg staff will schedule with you a maintenance window to perform the updates.

POLICY MANAGEMENT

RedLegg’s staff of security experts works with you to build a secure functional firewall policy that allows the business access to the resources it needs while providing the best security for your networks.

POLICY BACKUP

Regular backups are made to the configuration policy; in the event of a recovery or a necessary rollback, the backup policy will be available.

  • HEALTH AND PERFORMANCE
  • Health and performance of the appliance is monitored by RedLegg operations.  In the event of a system or performance issue, the RedLegg SOC is notified so that problems can be investigated.

  • AVAILABILITY AND OUTAGE NOTIFICATIONS
  • Availability of the equipment is monitored 24x7.  In the event that the device becomes unreachable, RedLegg SOC staff will begin investigation of possible network connectivity issues.  In the event that the device remains unreachable for the determined threshold, you will be notified using the escalation procedures established in our Data Gathering Form.

  • PATCH AND SOFTWARE UPDATES
  • When new software or signature updates or patches are available, RedLegg staff will schedule with you a maintenance window to perform the updates.

  • POLICY MANAGEMENT
  • RedLegg’s staff of security experts works with you to build a secure functional firewall policy that allows the business access to the resources it needs while providing the best security for your networks.

  • POLICY BACKUP
  • Regular backups are made to the configuration policy; in the event of a recovery or a necessary rollback, the backup policy will be available.

OUR APPROACH

RedLegg is an innovative, global security firm that delivers managed cybersecurity solutions and peace of mind to its clients.

RedLegg’s approach to information security protects the confidentiality, integrity, and availability of critical data based on a sound risk management framework. This approach allows organizations to engage business owners in defining acceptable levels of risk and to participate in the process for evaluating threats.

RedLegg’s ARMEE (Assess, Remediate, Monitor, Educate, Enforce) methodology institutes a lifecycle that allows for an ongoing process to continuously improve the security posture of the organization. This methodology is designed to be portable to all business, legal, regulatory, and security requirements of the organization. It is flexible enough to account for the constant flux in the market place, attack vectors, and protection mechanisms.

The final step in RedLegg’s ARMEE methodology is to implement solutions that enforce security measures needed to protect against threats that may affect an organization’s core business.

ARMEElogo-1

Resources

     
MSS-Monthly-Sample-Report

 

MSS-Slick-3D

 

Case Study_SIEM-International-Law-Firm-SOC-3D-1

 

SIEM-Architecture-Review

 

MSS Monthly Report Sample Managed Security Info Sheet Managed Security Case Studies SIEM Architecture Review

 

BETTER YOUR VISIBILITY.

Better defend your network.

REACH OUT